Overview
overview
7Static
static
3XMouse_But....5.exe
windows7-x64
7XMouse_But....5.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3BugTrapU-x64.dll
windows7-x64
1BugTrapU-x64.dll
windows10-2004-x64
1XMouseButt...ol.exe
windows7-x64
1XMouseButt...ol.exe
windows10-2004-x64
1XMouseButtonHook.dll
windows7-x64
1XMouseButtonHook.dll
windows10-2004-x64
1uninstaller.exe
windows7-x64
7uninstaller.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
330s -
max time network
316s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
XMouse_Button_Control_V2.20.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
XMouse_Button_Control_V2.20.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
BugTrapU-x64.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
BugTrapU-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
XMouseButtonControl.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
XMouseButtonControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
XMouseButtonHook.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
XMouseButtonHook.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
uninstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
uninstaller.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
XMouse_Button_Control_V2.20.5.exe
-
Size
2.9MB
-
MD5
2e9725bc1d71ad1b8006dfc5a2510f88
-
SHA1
6e1f7d12881696944bf5e030a7d131b969de0c6c
-
SHA256
2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818
-
SHA512
62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39
-
SSDEEP
49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3236 XMouseButtonControl.exe -
Loads dropped DLL 10 IoCs
pid Process 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3728 XMouse_Button_Control_V2.20.5.exe 3236 XMouseButtonControl.exe 3236 XMouseButtonControl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XMouseButtonControl = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe /notportable /delay" XMouse_Button_Control_V2.20.5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\License.txt XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\ChangeLog.txt XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\X-Mouse Button Control User Guide.pdf XMouse_Button_Control_V2.20.5.exe File opened for modification C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\changelog.txt XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe XMouse_Button_Control_V2.20.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XMouse_Button_Control_V2.20.5.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop XMouse_Button_Control_V2.20.5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\LowLevelHooksTimeout = "1000" XMouse_Button_Control_V2.20.5.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcs\ = "X-Mouse Button Control Application or Window Profile" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /import:\"%1\"" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbclp XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\ = "X-Mouse Button Control Language Pack" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open\command XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcs XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open\command XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\ = "X-Mouse Button Control Settings" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcp XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /install:\"%1\"" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /profile:\"%1\"" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcp\ = "X-Mouse Button Control Settings" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\ = "open" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\DefaultIcon XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\DefaultIcon XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbclp\ = "X-Mouse Button Control Language Pack" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\DefaultIcon XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\ = "X-Mouse Button Control Application or Window Profile" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\ = "open" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\ = "open" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open\command XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouse_Button_Control_V2.20.5.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 XMouseButtonControl.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 4880 msedge.exe 4880 msedge.exe 1376 identity_helper.exe 1376 identity_helper.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe 2632 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3236 XMouseButtonControl.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 3236 XMouseButtonControl.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 3236 XMouseButtonControl.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3236 XMouseButtonControl.exe 3236 XMouseButtonControl.exe 3236 XMouseButtonControl.exe 3236 XMouseButtonControl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3988 4880 msedge.exe 92 PID 4880 wrote to memory of 3988 4880 msedge.exe 92 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 1408 4880 msedge.exe 93 PID 4880 wrote to memory of 2028 4880 msedge.exe 94 PID 4880 wrote to memory of 2028 4880 msedge.exe 94 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95 PID 4880 wrote to memory of 5060 4880 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\XMouse_Button_Control_V2.20.5.exe"C:\Users\Admin\AppData\Local\Temp\XMouse_Button_Control_V2.20.5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
PID:3728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x641⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8ace246f8,0x7ff8ace24708,0x7ff8ace247182⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,18132005098524574551,14100725337245121937,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5532 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe"C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost1⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD580d5f32b3fc515402b9e1fe958dedf81
SHA1a80ffd7907e0de2ee4e13c592b888fe00551b7e0
SHA2560ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a
SHA5121589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0
-
Filesize
1.7MB
MD5bb632bc4c4414303c783a0153f6609f7
SHA1eb16bf0d8ce0af4d72dff415741fd0d7aac3020e
SHA2567cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8
SHA51215b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5
-
Filesize
1.0MB
MD5d62a4279ebba19c9bf0037d4f7cbf0bc
SHA15257d9505cca6b75fe55dfdaf2ea83a7d2d28170
SHA256c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0
SHA5126895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD560d345ac8342941e2c44b1c8e7f18e26
SHA1fd19950ca38499dc180a239b6a9543dc1104cc96
SHA2561bd7d5add9be800be46db9c0ca43b9f7252540d452094d8699917369f1c0ff4c
SHA512df3fda5689fbba1e4f812adb4b9f81b86b6c0ab43c1d0bbcbec294e30302721a4b4b4eafead61a8d720dfeef5a22ae7adcf6d647c81db78c5dce5a8605eae40a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD527ad2c471979fbfdac4917e4d32690e5
SHA1f2bf27c6d3a159c9ee27148437829749073768d2
SHA2561caae4ba09f68af1e2da90a8cecee8ac1e2e9bece04a24f3c38925d92ebcd5ac
SHA512022506dd36456a1ff71862e8bb9b7ab7e052e3b1f519306079867893897ba1e6a7598fd6ca72f86263c42f73458c3c27e1ceaeee3317c1b36df1e7037a17af1b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD576ec83f1dc45109a8ce3b7d60ba15dbf
SHA14f48b9311cfd59e5d9cbc72a6edc2f2fdc754850
SHA2562b4ae30309f84912003b482cc68bbb376bab5a4ecb2fa8ea5fd3fa6d95a5b6c7
SHA51240eb0a7ba7bcb963deedb70bf376c868ba4af290829f72a6df48d5efdab8cdf7843c9058846fd7317cb64df91df4747914e125baf4b5e1a0a72259ac9a6771bb
-
Filesize
1KB
MD58526f6b8319c8d6bafaa18dbf9f6cd59
SHA12ff81d32e19c10c0d5b830021592b2834e6c6297
SHA2566acb62d7c9fdf0e7a38fc2dea902e7b9acdff8c5a17865dcfc85121cc4ce581c
SHA51224d0cb58b47fb98c0d5acd901acf2855c8487a826ea207959a917715033b567e7d79c19195b9487cb8166b31227bd96cf8bee9653e1f8ae5e9de4a40a14fa255
-
Filesize
1KB
MD59ac58e15ee7d1d8c4adea49f31f52875
SHA1e8667b578e7d2a672b41aa1e2bb5825df2a7af7b
SHA256eb9912afef5a366d56accc3a4c0851b9f046e24b9efb9e389a7ce0db85a84ad7
SHA51294824dd332d6ec7355895bf2f70c2bf5754156f0b213bee25b08c22668711537ea4e9d73690f375f66ae1a97db9ea6f8c5b36c7b3c1d271eb5911b1c0da8d178
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD567e78c9d66bc3d22e698f00921d4f230
SHA1ce7fe4e2b451f6c9ebb7e8bebe97e5bfbd9f6f47
SHA25688245fd924358e002154e71d28bc9c2ca413f23f022013ad1e0329eac1808678
SHA512bbdab0e053c03bf025eaa2683b41c80ede98ba543057b91b7efa4e1e164b6c5f5608612d0cd2d4b9802bdea4a95250b18f0d88a082cc7e3d640f867279e82679
-
Filesize
5KB
MD5c3a9dbb978bcfcd0141f0a5ae6219119
SHA172e24f5b814f2b8e4e6c537b20f379ac245a203a
SHA2567734a5f80a4162fb7e1e3c20a7ff070c40b05113a4115fb46823bff8699c0efc
SHA51295fbb228c222568b9b068e1f071329995b7ff25d10104dabd9e777074ec40cb6262469f0226ec76079ba97b1ca0de3a7e08d6ec8e18b13cc9e3fd33b64530fce
-
Filesize
6KB
MD58926c7896c78e2d4127e15aeaf87c858
SHA1549a9783b277cb63f8d054de0aab534a963ad756
SHA2566351af2c9dc6880bd17d889c796229df26774fd099d3ad9b3846d4ce78a2fda4
SHA5125cf7bfda2b4ce63c4fb5805cc5757d4962f8a8fc30862f8152c1b21c4db3451bd26eac1d3547e39b1156549c20e7bed2876b6651b90e1b1d82dcd362b9a0069d
-
Filesize
538B
MD527fdccf8c577ba19616dfe165755dbf5
SHA1143cafcdb329ba362cbdd0b5c84fedce72b49d5b
SHA2567062797170a82ad05469168434b95adaa6b99fc1d0a6d8f6a5fa3da29d9ff5ae
SHA51258bdfa2238144cdb8eaf65e1f696ac943b9f898ccfc924f1f4a51e504a9c896db3cb1d5932ad37e3ac5aa880e2f968ebf14c6051acbcfb64ab0eea715fb27a6f
-
Filesize
538B
MD5a3e5bf51a2aed8348a9c4bb7cafafdb1
SHA1cd6d714d5e80be493afd7c677bdfc3bff59a2598
SHA256df0475e1dd2cc3d5082398019da1afa1896a8a00822a04d31e1d06371afc589a
SHA5128d377f76576a3a943d08e1bd9093e52e308abc5df6b3e513e36dd824ef029f55371cb4157ff70cb1ae4d91655236c8ee11cfb204a85b1affaf137c16c4cb638d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a3ed8de7-a78e-4e90-a419-9347ad3f076a.tmp
Filesize6KB
MD53c4988956e158efe6893a2fa905bcc8a
SHA1f41598e57cfd1b6e39dea804fd6d21033b33c9fd
SHA2566a075be637f84986f1c8434222e86aed75654190dbddd1dd114e9656b5fd28e3
SHA512280e5e010aa6ace8a14d29b686ba23319ad452e99b472796970faeac997e3bac7da0c7526b86d9ef284593ab4f4ae21dc71c44a1ad1f5aa227ba07bcb914c128
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ba190a964052fdd2a5fbb1c881ccf19f
SHA153f4f2d54f02ab95428c632b0ad57e265e5df6e9
SHA256e7d625e59e504254d8a3451d26075bba769bdb4ee5f144fe4300f9aab923d708
SHA5126201eed1aae778a3100b1b46f5c0dbad5aabfcf03ed69b260fb6bb7306958fdc772bcab72a3c6fd7ddd525ff396b5de97367e5d6f0fa99a10698afaa4aa57cf2
-
Filesize
11KB
MD56a87520f17f0eaa0dac3cbb6795a9c3b
SHA1683c0d6d18696be8ac3fe94fbaaeeb9461f72606
SHA256d1d9f210dcb861c333e28f98ee8e5d8ca1b859fbe2d46e2dbeaa2e46bc40d128
SHA512229967f7a7516aa29a9d13ec2c35b3139caa4825eae0f3455a35472bb67c16da1230d2afdcf85c8b00bb2358eba2dcda80dc43bc100758791e3592d5e081466a
-
Filesize
10KB
MD566318f13193a720a789675e2a6412089
SHA1cc5ff379e7f7c23db03d036a6ea542395d70bf7c
SHA2567ea2d0baafa5f6b91ca78edb9af8b86c7969ede447c03016bc79d3dffba509e8
SHA512666ee62ec31de8d843e904ee83fddae4d5bb9bab57eb43077dd6b0c6d38e1b7a50b11d5a2439a51f2eabfe80f4810bcd9628e608e5363125bda0f8a706d8640a
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
7KB
MD586a81b9ab7de83aa01024593a03d1872
SHA18fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be
SHA25627d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115
SHA512cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
696B
MD5aaf1fcb5768f742f55c23128926b2601
SHA162f220941246c79f87b211d23eafe2e9f5195552
SHA256506ade0bac6df214bdbd204f0fe31fcdf961b0fffb99031d131fd5dd37c21847
SHA512f89ddf2cbfca834c80ef055c1482e8465dfdcb1a4531d5e78e0a2834da858914e901dbf44994e394c4fa4972cc8b122b32757d37777a337b2907051df6d1e987
-
Filesize
709B
MD528fc05116dc371cdda93409fdb44cb31
SHA1e305e59d00f50b704c67759ec582e6dd7b7ba221
SHA256e1141ce813b3de0e48fca83eb56b93de7758dbca31c6d28f9aabb89faca8c84e
SHA512914c5ba20076440d014573d1daf950276fc57ba4190211e22b9f83eb67fc1c6232f3ca30e3723a404b00067b657c094e9dadf7f16cbbaba3a404c2d5850a9731
-
Filesize
726B
MD585c386b072b0e6473b2ae9eccad028f9
SHA155fd785ebbb4ca2dc4c556c4cb0c34b0a300daa8
SHA256e43bbf1ffc9358d02a5ddec0f8b7a597da1036ab1c78749182e6d8738438ada8
SHA51276393e67fb7ea4ef7d1e778abfb262ba5d306fe2924d0fc4015e924570db523661dc098e05441360b355fb38bcb9d5b03102faf58d34aa5936a151dd83860655
-
Filesize
9KB
MD5f832e4279c8ff9029b94027803e10e1b
SHA1134ff09f9c70999da35e73f57b70522dc817e681
SHA2564cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061
SHA512bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d