Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 09:02
Static task
static1
Behavioral task
behavioral1
Sample
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe
Resource
win10v2004-20220901-en
General
-
Target
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe
-
Size
360KB
-
MD5
15130b436ed87bd0973a4d346cc97f35
-
SHA1
ce60d23f48664b2882e61562e7dec5c8480502b5
-
SHA256
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c
-
SHA512
8f568d962666ab94aac8401b3218ca8e40957d69c35d63c63ba9a59295f76612fc6e60cdda6b5fdeef7d9adece38cd0cb39b0946ca16d2b5ebf1750473d4c0a0
-
SSDEEP
6144:Jy2BDEfHtIs1AeVh4kjINbvI5pwUGGXGPeT3LvHyvMNGyoN0zM5GuObOuNAvwu:REGs1Zj4kjINbSwU3Lzyv7y9eObOmAvB
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\_RECOVERY_+equqc.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/CA241907DECF1
http://tes543berda73i48fsdfsd.keratadze.at/CA241907DECF1
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/CA241907DECF1
http://xlowfznrg4wf7dli.ONION/CA241907DECF1
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\_RECOVERY_+equqc.html
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/CA241907DECF1
http://tes543berda73i48fsdfsd.keratadze.at/CA241907DECF1
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/CA241907DECF1
http://xlowfznrg4wf7dli.onion/CA241907DECF1
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
xqcibneggyid.exepid Process 4376 xqcibneggyid.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
xqcibneggyid.exedescription ioc Process File renamed C:\Users\Admin\Pictures\UnprotectResolve.raw => C:\Users\Admin\Pictures\UnprotectResolve.raw.mp3 xqcibneggyid.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exexqcibneggyid.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation xqcibneggyid.exe -
Drops startup file 6 IoCs
Processes:
xqcibneggyid.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_RECOVERY_+equqc.txt xqcibneggyid.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
xqcibneggyid.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run xqcibneggyid.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sxrpmgcmhqer = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\xqcibneggyid.exe\"" xqcibneggyid.exe -
Drops file in Program Files directory 64 IoCs
Processes:
xqcibneggyid.exedescription ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\sl-SI\View3d\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\Images\SkypeLargeTile.scale-100_contrast-black.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-64_altform-unplated.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PlaceCard\contrast-white\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\StoreLargeTile.scale-100.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\Weather_TileWide.scale-200.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\LinkedInboxBadge.scale-125.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\GameBarNotificationLogo.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\SplashWideTile.scale-200_contrast-white.png xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\GettingStarted16\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\jscripts\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\Pyramid.Wide.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\WideTile.scale-100_contrast-white.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-80_contrast-white.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-32_altform-unplated.png xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\30.jpg xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\en-US\webviewCore.min.js xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-180.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosLargeTile.contrast-white_scale-125.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\Images\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\notificationsUI\notificationCenter_light.css xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_altform-unplated_contrast-black.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-80_contrast-white.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\electron-upgrade-screen-illustration.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\2876_24x24x32.png xqcibneggyid.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GamesXboxHubWideTile.scale-200_contrast-high.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_RECOVERY_+equqc.txt xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedSplash.scale-200_contrast-black.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-16.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Images\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\MedTile.scale-200.png xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TRANSLAT\FREN\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-white\_RECOVERY_+equqc.html xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSplashLogo.scale-300.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-100.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.UI\Resources\Images\Home-Placeholder.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-72.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\LibrarySquare150x150Logo.scale-200_contrast-white.png xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-400_contrast-white.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_BadgeLogo.scale-100.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteSmallTile.scale-150.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_altform-unplated_contrast-black.png xqcibneggyid.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_RECOVERY_+equqc.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionWideTile.scale-150.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\MedTile.scale-100.png xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\OutlookMailWideTile.scale-200.png xqcibneggyid.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\INDUST\THMBNAIL.PNG xqcibneggyid.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_altform-unplated_contrast-white.png xqcibneggyid.exe -
Drops file in Windows directory 2 IoCs
Processes:
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exedescription ioc Process File created C:\Windows\xqcibneggyid.exe acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe File opened for modification C:\Windows\xqcibneggyid.exe acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
Processes:
xqcibneggyid.exemsedge.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings xqcibneggyid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 2360 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
xqcibneggyid.exepid Process 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe 4376 xqcibneggyid.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid Process 4644 msedge.exe 4644 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exexqcibneggyid.exeWMIC.exevssvc.exeWMIC.exedescription pid Process Token: SeDebugPrivilege 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe Token: SeDebugPrivilege 4376 xqcibneggyid.exe Token: SeIncreaseQuotaPrivilege 5012 WMIC.exe Token: SeSecurityPrivilege 5012 WMIC.exe Token: SeTakeOwnershipPrivilege 5012 WMIC.exe Token: SeLoadDriverPrivilege 5012 WMIC.exe Token: SeSystemProfilePrivilege 5012 WMIC.exe Token: SeSystemtimePrivilege 5012 WMIC.exe Token: SeProfSingleProcessPrivilege 5012 WMIC.exe Token: SeIncBasePriorityPrivilege 5012 WMIC.exe Token: SeCreatePagefilePrivilege 5012 WMIC.exe Token: SeBackupPrivilege 5012 WMIC.exe Token: SeRestorePrivilege 5012 WMIC.exe Token: SeShutdownPrivilege 5012 WMIC.exe Token: SeDebugPrivilege 5012 WMIC.exe Token: SeSystemEnvironmentPrivilege 5012 WMIC.exe Token: SeRemoteShutdownPrivilege 5012 WMIC.exe Token: SeUndockPrivilege 5012 WMIC.exe Token: SeManageVolumePrivilege 5012 WMIC.exe Token: 33 5012 WMIC.exe Token: 34 5012 WMIC.exe Token: 35 5012 WMIC.exe Token: 36 5012 WMIC.exe Token: SeIncreaseQuotaPrivilege 5012 WMIC.exe Token: SeSecurityPrivilege 5012 WMIC.exe Token: SeTakeOwnershipPrivilege 5012 WMIC.exe Token: SeLoadDriverPrivilege 5012 WMIC.exe Token: SeSystemProfilePrivilege 5012 WMIC.exe Token: SeSystemtimePrivilege 5012 WMIC.exe Token: SeProfSingleProcessPrivilege 5012 WMIC.exe Token: SeIncBasePriorityPrivilege 5012 WMIC.exe Token: SeCreatePagefilePrivilege 5012 WMIC.exe Token: SeBackupPrivilege 5012 WMIC.exe Token: SeRestorePrivilege 5012 WMIC.exe Token: SeShutdownPrivilege 5012 WMIC.exe Token: SeDebugPrivilege 5012 WMIC.exe Token: SeSystemEnvironmentPrivilege 5012 WMIC.exe Token: SeRemoteShutdownPrivilege 5012 WMIC.exe Token: SeUndockPrivilege 5012 WMIC.exe Token: SeManageVolumePrivilege 5012 WMIC.exe Token: 33 5012 WMIC.exe Token: 34 5012 WMIC.exe Token: 35 5012 WMIC.exe Token: 36 5012 WMIC.exe Token: SeBackupPrivilege 4372 vssvc.exe Token: SeRestorePrivilege 4372 vssvc.exe Token: SeAuditPrivilege 4372 vssvc.exe Token: SeIncreaseQuotaPrivilege 3048 WMIC.exe Token: SeSecurityPrivilege 3048 WMIC.exe Token: SeTakeOwnershipPrivilege 3048 WMIC.exe Token: SeLoadDriverPrivilege 3048 WMIC.exe Token: SeSystemProfilePrivilege 3048 WMIC.exe Token: SeSystemtimePrivilege 3048 WMIC.exe Token: SeProfSingleProcessPrivilege 3048 WMIC.exe Token: SeIncBasePriorityPrivilege 3048 WMIC.exe Token: SeCreatePagefilePrivilege 3048 WMIC.exe Token: SeBackupPrivilege 3048 WMIC.exe Token: SeRestorePrivilege 3048 WMIC.exe Token: SeShutdownPrivilege 3048 WMIC.exe Token: SeDebugPrivilege 3048 WMIC.exe Token: SeSystemEnvironmentPrivilege 3048 WMIC.exe Token: SeRemoteShutdownPrivilege 3048 WMIC.exe Token: SeUndockPrivilege 3048 WMIC.exe Token: SeManageVolumePrivilege 3048 WMIC.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exexqcibneggyid.exemsedge.exedescription pid Process procid_target PID 5080 wrote to memory of 4376 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe 76 PID 5080 wrote to memory of 4376 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe 76 PID 5080 wrote to memory of 4376 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe 76 PID 5080 wrote to memory of 1288 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe 77 PID 5080 wrote to memory of 1288 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe 77 PID 5080 wrote to memory of 1288 5080 acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe 77 PID 4376 wrote to memory of 5012 4376 xqcibneggyid.exe 81 PID 4376 wrote to memory of 5012 4376 xqcibneggyid.exe 81 PID 4376 wrote to memory of 2360 4376 xqcibneggyid.exe 94 PID 4376 wrote to memory of 2360 4376 xqcibneggyid.exe 94 PID 4376 wrote to memory of 2360 4376 xqcibneggyid.exe 94 PID 4376 wrote to memory of 4644 4376 xqcibneggyid.exe 95 PID 4376 wrote to memory of 4644 4376 xqcibneggyid.exe 95 PID 4376 wrote to memory of 3048 4376 xqcibneggyid.exe 96 PID 4376 wrote to memory of 3048 4376 xqcibneggyid.exe 96 PID 4644 wrote to memory of 3096 4644 msedge.exe 99 PID 4644 wrote to memory of 3096 4644 msedge.exe 99 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 3400 4644 msedge.exe 102 PID 4644 wrote to memory of 4128 4644 msedge.exe 103 PID 4644 wrote to memory of 4128 4644 msedge.exe 103 PID 4644 wrote to memory of 1532 4644 msedge.exe 105 PID 4644 wrote to memory of 1532 4644 msedge.exe 105 PID 4644 wrote to memory of 1532 4644 msedge.exe 105 PID 4644 wrote to memory of 1532 4644 msedge.exe 105 PID 4644 wrote to memory of 1532 4644 msedge.exe 105 -
System policy modification 1 TTPs 2 IoCs
Processes:
xqcibneggyid.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xqcibneggyid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" xqcibneggyid.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe"C:\Users\Admin\AppData\Local\Temp\acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\xqcibneggyid.exeC:\Windows\xqcibneggyid.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4376 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RECOVERY.TXT3⤵
- Opens file in notepad (likely ransom note)
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\RECOVERY.HTM3⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc48b746f8,0x7ffc48b74708,0x7ffc48b747184⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15829387514499118822,8671635111689864424,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:24⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15829387514499118822,8671635111689864424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:34⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15829387514499118822,8671635111689864424,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3316 /prefetch:84⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15829387514499118822,8671635111689864424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:14⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15829387514499118822,8671635111689864424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:14⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2136,15829387514499118822,8671635111689864424,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5604 /prefetch:84⤵PID:3344
-
-
-
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\ACBC86~1.EXE2⤵PID:1288
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5103fe5d04d3f1b1d36d0efdbf240849a
SHA141463680c78598ff817e8c54a4f51e3e220f8fd3
SHA256047a0d4cf38993d4022bf09c8d489db05af6a0327be526453a6c75eb17cf5417
SHA512afaa75a715599b66426215ee09be45db1576348a9d116061042003e577bd762f335387eda2cb4110d1b521d2130b661334e267acfd221f4702d333de88176913
-
Filesize
62KB
MD56305124ed854e1184ebda64a8bf6d842
SHA13846ee107ac9460c7eebc7c3fa1b080cb8afd3a5
SHA2562a70fde53a27a8b3bb605235f7e95699da5fcf4f7b6ec45416a22c5c4c4d0954
SHA512d0286c280351bbb5fe237b4bcd516a7c122e3f283ab6b8e9baa15f7aa538d19a929c63caa2e69cfc789db590e28f5a04f1b12fd9a46cbb424266f4a9ef4bb724
-
Filesize
1KB
MD5156a2e26f4680f7801031842c746a0c0
SHA131207240df52f6dd9287c20ecc0904c4b735a1c7
SHA256a375bf5449104dfe9eb03d0d5904f9c534753ef4f0d57202029eaa4ec868e2cd
SHA5125750473221245cc54ac2a0e740473c2b1eb052f0a097af176a3bc3e5ee4ef26d73f0bbf902849f84bf58b33b11a0d8dd752849c1d2c4cdd85dc1e7817674274e
-
Filesize
11KB
MD5103fe5d04d3f1b1d36d0efdbf240849a
SHA141463680c78598ff817e8c54a4f51e3e220f8fd3
SHA256047a0d4cf38993d4022bf09c8d489db05af6a0327be526453a6c75eb17cf5417
SHA512afaa75a715599b66426215ee09be45db1576348a9d116061042003e577bd762f335387eda2cb4110d1b521d2130b661334e267acfd221f4702d333de88176913
-
Filesize
62KB
MD56305124ed854e1184ebda64a8bf6d842
SHA13846ee107ac9460c7eebc7c3fa1b080cb8afd3a5
SHA2562a70fde53a27a8b3bb605235f7e95699da5fcf4f7b6ec45416a22c5c4c4d0954
SHA512d0286c280351bbb5fe237b4bcd516a7c122e3f283ab6b8e9baa15f7aa538d19a929c63caa2e69cfc789db590e28f5a04f1b12fd9a46cbb424266f4a9ef4bb724
-
Filesize
1KB
MD5156a2e26f4680f7801031842c746a0c0
SHA131207240df52f6dd9287c20ecc0904c4b735a1c7
SHA256a375bf5449104dfe9eb03d0d5904f9c534753ef4f0d57202029eaa4ec868e2cd
SHA5125750473221245cc54ac2a0e740473c2b1eb052f0a097af176a3bc3e5ee4ef26d73f0bbf902849f84bf58b33b11a0d8dd752849c1d2c4cdd85dc1e7817674274e
-
Filesize
11KB
MD5103fe5d04d3f1b1d36d0efdbf240849a
SHA141463680c78598ff817e8c54a4f51e3e220f8fd3
SHA256047a0d4cf38993d4022bf09c8d489db05af6a0327be526453a6c75eb17cf5417
SHA512afaa75a715599b66426215ee09be45db1576348a9d116061042003e577bd762f335387eda2cb4110d1b521d2130b661334e267acfd221f4702d333de88176913
-
Filesize
62KB
MD56305124ed854e1184ebda64a8bf6d842
SHA13846ee107ac9460c7eebc7c3fa1b080cb8afd3a5
SHA2562a70fde53a27a8b3bb605235f7e95699da5fcf4f7b6ec45416a22c5c4c4d0954
SHA512d0286c280351bbb5fe237b4bcd516a7c122e3f283ab6b8e9baa15f7aa538d19a929c63caa2e69cfc789db590e28f5a04f1b12fd9a46cbb424266f4a9ef4bb724
-
Filesize
1KB
MD5156a2e26f4680f7801031842c746a0c0
SHA131207240df52f6dd9287c20ecc0904c4b735a1c7
SHA256a375bf5449104dfe9eb03d0d5904f9c534753ef4f0d57202029eaa4ec868e2cd
SHA5125750473221245cc54ac2a0e740473c2b1eb052f0a097af176a3bc3e5ee4ef26d73f0bbf902849f84bf58b33b11a0d8dd752849c1d2c4cdd85dc1e7817674274e
-
Filesize
11KB
MD5103fe5d04d3f1b1d36d0efdbf240849a
SHA141463680c78598ff817e8c54a4f51e3e220f8fd3
SHA256047a0d4cf38993d4022bf09c8d489db05af6a0327be526453a6c75eb17cf5417
SHA512afaa75a715599b66426215ee09be45db1576348a9d116061042003e577bd762f335387eda2cb4110d1b521d2130b661334e267acfd221f4702d333de88176913
-
Filesize
62KB
MD56305124ed854e1184ebda64a8bf6d842
SHA13846ee107ac9460c7eebc7c3fa1b080cb8afd3a5
SHA2562a70fde53a27a8b3bb605235f7e95699da5fcf4f7b6ec45416a22c5c4c4d0954
SHA512d0286c280351bbb5fe237b4bcd516a7c122e3f283ab6b8e9baa15f7aa538d19a929c63caa2e69cfc789db590e28f5a04f1b12fd9a46cbb424266f4a9ef4bb724
-
Filesize
1KB
MD5156a2e26f4680f7801031842c746a0c0
SHA131207240df52f6dd9287c20ecc0904c4b735a1c7
SHA256a375bf5449104dfe9eb03d0d5904f9c534753ef4f0d57202029eaa4ec868e2cd
SHA5125750473221245cc54ac2a0e740473c2b1eb052f0a097af176a3bc3e5ee4ef26d73f0bbf902849f84bf58b33b11a0d8dd752849c1d2c4cdd85dc1e7817674274e
-
Filesize
11KB
MD5103fe5d04d3f1b1d36d0efdbf240849a
SHA141463680c78598ff817e8c54a4f51e3e220f8fd3
SHA256047a0d4cf38993d4022bf09c8d489db05af6a0327be526453a6c75eb17cf5417
SHA512afaa75a715599b66426215ee09be45db1576348a9d116061042003e577bd762f335387eda2cb4110d1b521d2130b661334e267acfd221f4702d333de88176913
-
Filesize
1KB
MD5156a2e26f4680f7801031842c746a0c0
SHA131207240df52f6dd9287c20ecc0904c4b735a1c7
SHA256a375bf5449104dfe9eb03d0d5904f9c534753ef4f0d57202029eaa4ec868e2cd
SHA5125750473221245cc54ac2a0e740473c2b1eb052f0a097af176a3bc3e5ee4ef26d73f0bbf902849f84bf58b33b11a0d8dd752849c1d2c4cdd85dc1e7817674274e
-
Filesize
360KB
MD515130b436ed87bd0973a4d346cc97f35
SHA1ce60d23f48664b2882e61562e7dec5c8480502b5
SHA256acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c
SHA5128f568d962666ab94aac8401b3218ca8e40957d69c35d63c63ba9a59295f76612fc6e60cdda6b5fdeef7d9adece38cd0cb39b0946ca16d2b5ebf1750473d4c0a0
-
Filesize
360KB
MD515130b436ed87bd0973a4d346cc97f35
SHA1ce60d23f48664b2882e61562e7dec5c8480502b5
SHA256acbc86b4d8068db472463de8b9c6d50809307af594cbd056feb0f19961f9462c
SHA5128f568d962666ab94aac8401b3218ca8e40957d69c35d63c63ba9a59295f76612fc6e60cdda6b5fdeef7d9adece38cd0cb39b0946ca16d2b5ebf1750473d4c0a0
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e