Analysis
-
max time kernel
233s -
max time network
233s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-01-2025 16:29
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
xworm
IDKTOBEHONESTNIGAS-56344.portmap.io:56344
-
Install_directory
%LocalAppData%
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00280000000462e7-203.dat family_xworm behavioral1/memory/5288-218-0x0000000000570000-0x0000000000584000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5556 powershell.exe 5972 powershell.exe 5208 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation Fixer.cmd -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fixer.lnk Fixer.cmd File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fixer.lnk Fixer.cmd -
Executes dropped EXE 2 IoCs
pid Process 5288 Fixer.cmd 5392 Fixer.cmd -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fixer = "C:\\Users\\Admin\\AppData\\Local\\Fixer.cmd" Fixer.cmd -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 ip-api.com -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\dc4bf30c-cde7-4119-8865-2bf474e5af01.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250122162950.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 584109.crdownload:SmartScreen msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5572 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 3104 msedge.exe 3104 msedge.exe 2812 identity_helper.exe 2812 identity_helper.exe 5164 msedge.exe 5164 msedge.exe 5556 powershell.exe 5556 powershell.exe 5556 powershell.exe 5888 taskmgr.exe 5888 taskmgr.exe 5972 powershell.exe 5972 powershell.exe 5972 powershell.exe 5888 taskmgr.exe 5208 powershell.exe 5208 powershell.exe 5208 powershell.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5888 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5288 Fixer.cmd Token: SeDebugPrivilege 5392 Fixer.cmd Token: SeDebugPrivilege 5556 powershell.exe Token: SeIncreaseQuotaPrivilege 5556 powershell.exe Token: SeSecurityPrivilege 5556 powershell.exe Token: SeTakeOwnershipPrivilege 5556 powershell.exe Token: SeLoadDriverPrivilege 5556 powershell.exe Token: SeSystemProfilePrivilege 5556 powershell.exe Token: SeSystemtimePrivilege 5556 powershell.exe Token: SeProfSingleProcessPrivilege 5556 powershell.exe Token: SeIncBasePriorityPrivilege 5556 powershell.exe Token: SeCreatePagefilePrivilege 5556 powershell.exe Token: SeBackupPrivilege 5556 powershell.exe Token: SeRestorePrivilege 5556 powershell.exe Token: SeShutdownPrivilege 5556 powershell.exe Token: SeDebugPrivilege 5556 powershell.exe Token: SeSystemEnvironmentPrivilege 5556 powershell.exe Token: SeRemoteShutdownPrivilege 5556 powershell.exe Token: SeUndockPrivilege 5556 powershell.exe Token: SeManageVolumePrivilege 5556 powershell.exe Token: 33 5556 powershell.exe Token: 34 5556 powershell.exe Token: 35 5556 powershell.exe Token: 36 5556 powershell.exe Token: SeDebugPrivilege 5888 taskmgr.exe Token: SeSystemProfilePrivilege 5888 taskmgr.exe Token: SeCreateGlobalPrivilege 5888 taskmgr.exe Token: SeDebugPrivilege 5972 powershell.exe Token: SeIncreaseQuotaPrivilege 5972 powershell.exe Token: SeSecurityPrivilege 5972 powershell.exe Token: SeTakeOwnershipPrivilege 5972 powershell.exe Token: SeLoadDriverPrivilege 5972 powershell.exe Token: SeSystemProfilePrivilege 5972 powershell.exe Token: SeSystemtimePrivilege 5972 powershell.exe Token: SeProfSingleProcessPrivilege 5972 powershell.exe Token: SeIncBasePriorityPrivilege 5972 powershell.exe Token: SeCreatePagefilePrivilege 5972 powershell.exe Token: SeBackupPrivilege 5972 powershell.exe Token: SeRestorePrivilege 5972 powershell.exe Token: SeShutdownPrivilege 5972 powershell.exe Token: SeDebugPrivilege 5972 powershell.exe Token: SeSystemEnvironmentPrivilege 5972 powershell.exe Token: SeRemoteShutdownPrivilege 5972 powershell.exe Token: SeUndockPrivilege 5972 powershell.exe Token: SeManageVolumePrivilege 5972 powershell.exe Token: 33 5972 powershell.exe Token: 34 5972 powershell.exe Token: 35 5972 powershell.exe Token: 36 5972 powershell.exe Token: SeDebugPrivilege 5208 powershell.exe Token: SeIncreaseQuotaPrivilege 5208 powershell.exe Token: SeSecurityPrivilege 5208 powershell.exe Token: SeTakeOwnershipPrivilege 5208 powershell.exe Token: SeLoadDriverPrivilege 5208 powershell.exe Token: SeSystemProfilePrivilege 5208 powershell.exe Token: SeSystemtimePrivilege 5208 powershell.exe Token: SeProfSingleProcessPrivilege 5208 powershell.exe Token: SeIncBasePriorityPrivilege 5208 powershell.exe Token: SeCreatePagefilePrivilege 5208 powershell.exe Token: SeBackupPrivilege 5208 powershell.exe Token: SeRestorePrivilege 5208 powershell.exe Token: SeShutdownPrivilege 5208 powershell.exe Token: SeDebugPrivilege 5208 powershell.exe Token: SeSystemEnvironmentPrivilege 5208 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe 5888 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 2492 3104 msedge.exe 82 PID 3104 wrote to memory of 2492 3104 msedge.exe 82 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 4424 3104 msedge.exe 83 PID 3104 wrote to memory of 1320 3104 msedge.exe 84 PID 3104 wrote to memory of 1320 3104 msedge.exe 84 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 PID 3104 wrote to memory of 4536 3104 msedge.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/4yaOMG1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x100,0x7ffba6a446f8,0x7ffba6a44708,0x7ffba6a447182⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:2480 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6446e5460,0x7ff6446e5470,0x7ff6446e54803⤵PID:1424
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6300 /prefetch:82⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5164
-
-
C:\Users\Admin\Downloads\Fixer.cmd"C:\Users\Admin\Downloads\Fixer.cmd"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Downloads\Fixer.cmd'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Fixer.cmd'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Fixer.cmd'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Fixer" /tr "C:\Users\Admin\AppData\Local\Fixer.cmd"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5572
-
-
-
C:\Users\Admin\Downloads\Fixer.cmd"C:\Users\Admin\Downloads\Fixer.cmd"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10700878786687073701,11822202345298257941,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6204 /prefetch:22⤵PID:6044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5888
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Fixer.cmd""1⤵PID:4456
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Fixer.cmd""1⤵PID:4412
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Fixer.cmd""1⤵PID:5464
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
152B
MD5254fc2a9d1a15f391d493bff79f66f08
SHA16165d5a9de512bb33a82d99d141a2562aa1aabfb
SHA2562bf9282b87bdef746d298cff0734b9a82cd9c24656cb167b24a84c30fb6a1fd0
SHA512484a1c99ee3c3d1ebf0af5ec9e73c9a2ca3cf8918f0ba2a4b543b75fa587ec6b432866b74bcd6b5cdd9372532c882da438d44653bd5bccdbc94ebc27852ff9e2
-
Filesize
152B
MD55408de1548eb3231accfb9f086f2b9db
SHA1f2d8c7e9f3e26cd49ee0a7a4fecd70b2bf2b7e8a
SHA2563052d0885e0ef0d71562958b851db519cfed36fd8e667b57a65374ee1a13a670
SHA512783254d067de3ac40df618665be7f76a6a8acb7e63b875bffc3c0c73b68d138c8a98c437e6267a1eb33f04be976a14b081a528598b1e517cdd9ad2293501acc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD57235bcdf66920def373fc03f8d9f3fa3
SHA1807f48a5da7489f0c855573d848a0c2007b503a1
SHA25600970274781dee5dff0d765b3fb602b408c1c331348ba9e06162946c4bc41b6c
SHA512601f019c2745bd07017d34ef4a65459398989d1fe07606777e1279e8ac68f93e7141c8e7c27f8abfa361fef302caebc1b687f0407ffb06a08c03da12ddc85d4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5a687c4aa3766e3b9f6e4162679ad2e10
SHA1010c2ef16f7febbd54088d7c2c7bab17b8a69709
SHA2566679c9d16a235ed605a5ea1b602348d5c2ce99b813d473e030f00c164b1f91b2
SHA512348fd1238c62d9503cd1c4eb82763472ab9f62d234b3de40e7e70b3be8b46237bd7b712297efeed0912b7b41fe329d28e545204cd53ce7be386b52bb9a0f043b
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
391B
MD5f228cb093f1dcfadd7c599e668ccac30
SHA10897ece1f7c86dbfdd5b072e640219d5ca4d4853
SHA2562b451f55152846c044ef6fa0f5889940692c56fb12dc950ca97a493d4a23f55c
SHA512819e6a00273274f5b265869e64d51f4e7b0d5bdd3cd5bd39b2fdbb58108c9ef1e712d2bab17f9cac7d6101c49e9ec9d090ba64634887b43ba0f5cc5e14ab34b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5880e3.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD572b9f613a292689996d04d98ba9944be
SHA107ec29ac159abf901011c62768797f01b52f3d46
SHA2561c525a9592815e72a4e9bd51bf6eed6ba7e4338b45dddbf1f432e1c2a926f73c
SHA5126f55932f8072f5d026f63773137966788607898d5e248fae027cfd52875e185d92b4f849ebb3754d4e6dde3ff64acc7e31228c957654ff067b41b346ef87b1e5
-
Filesize
6KB
MD57915740eb64ad26636b732b55a0dd5df
SHA1eaf1ce9deeb8a95bf1c85ae654d3a7b2f88fd52b
SHA2560e906a2d9a08b6d912e0578525561beb8932c75668490739b4afe987989a372c
SHA512d14ca47b04a6abe5217f3d66ba26d9008e270b81c2a076b06098ae356c24e95636672e22f24ab98ac69b7c99f19f9a7b02458de874e087640fcecab20b5aee97
-
Filesize
5KB
MD573b8ba3dd8ecd63e3c7e72da7d827e9d
SHA1b8166a87ecaa524c619ad9c545bcdb866b8dede2
SHA25672dc2ed91b009ddd4bb69bcb091958db96a0eba358abb44f1c47c145344490a3
SHA512c3f9672d809143f5f9d305e77016ac0ae71eaebb2191c85432792343cdcd25032d05bb817e50af6e248b82851c6cd89a0bb502efff06ffc12908b0baff2bcb37
-
Filesize
6KB
MD5dc55bf2093bac4869dd8fbc98b3c68b8
SHA1cd332b6ef770068dd5fd46d42e5f4275aadb42b5
SHA2561949548dcb3f259a7088140562b85984732e0e1ea1167c4c9f756ad0a4f98dcf
SHA5129afc1396a38c616fc224199e39acfb76a6a11224eb41bba1232a14504a65e5bc589521d61d19661be5edee1d13bb53059b749100559ae958a68311045293bb1e
-
Filesize
24KB
MD5bc3a0ca62cfef580ff9ebbb7afc92b9b
SHA1fde9832ce521fcd53850d0701a543ef75b772e3b
SHA256b0203fb7c3812937e92ac04ad6065a2129bc165a36a60a4d2fdb0accc4499464
SHA512fc1f3a5bd2106d9b6ed5a678c2f4978550a0d7414172b0ce6954a835b0da01ac28c177955a48c2ef56ea3d517a6672474a9cab873aeccae3f22a45ccf2d070de
-
Filesize
24KB
MD548febe0b0625901956573dfb2378e7ed
SHA1c324173a8f8fd7a6a7398f6bb24dd2ee11d3cf24
SHA256f0fae7ad33efdd05845d0d631ce8341ea4b6dfd4c45be844f0c117738df9c0d0
SHA512fc38a0c64e67e3b5d43f787fe86f700e6f753d8e90bcebc446d4a8c631b9e4362a74fa862a5b2ffc74f3f5236d3ecf006b341042b5469d1cc24f2c325a607a91
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5720a68f1a2b34934dcb833eb8e4bc7f1
SHA1cfc58e34cd95e88ffb90e29a5b128a158a7f1132
SHA256fa7e24a18d1974d2f8c3541a1425b8fece930de4146afa749948c879476c3cde
SHA51230b5e78a05c0dc556edb9be14f13c257e4e426253bdb1c0ba9d386e5d783e513884f5e8f1b3461ab062087f25d95cb210ebef72bbe04d105b3582cb788966c3e
-
Filesize
11KB
MD59cddbef6c1f6685e946840d5dd415407
SHA184b26c75ffef1a11375cacfb1926baf1153838d7
SHA256db8d5bb394e903733bb86f4d1404873f85638fb0ba6b13065f7c1c99d18737b7
SHA512bfbcd405e88440f5df2c6e289a5a72057266bd7f19e7501b1b55af09272debac834c40065f657933a0405d06b5c20df20bebbd054ddd2b6c8580a2f9278b97f6
-
Filesize
10KB
MD56b835c77f35df83b06a5139237688d99
SHA1b38067b65df0e7f2b4eccec5ffb7777b30c6877c
SHA25624ec76dfa8b287254c9e199d8a73152947c25520cf64265553bc64b9d543307d
SHA512d0fd5bc942e9304be0b083f7f7cfb7cdc7fc716f5e519c7ffa871b28cf77aa9da757898fb926323639a82e0015717f65a6aab799963b8984d5e4ecd15a4a2195
-
Filesize
8KB
MD59366a2c1241ea8a7ba0dc83d8773df1b
SHA12e36c0cdb82e205a476b19ae8ab5266beb8ea9b4
SHA256f92da1c0fa8516fa7cd98ac6cd109e0b3af361bf062563f6162efacfc2820678
SHA512ab1fdf949c56a57cba36dff80c84aa513529b79671d758d3d8f90f0690d4dae1591401d35bdc0a439cac85d335fd967354dbf4b3583be851876b930606548d47
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD55bf22764bbfce763f555a9d73c6d8901
SHA1f308712780d7a0565d53239b41666fed018a7f64
SHA256359f4116adf02b56a97acd0663da54e03f7fecec3c67a14d3db4c194e145c667
SHA51275000279d14ac096520d58b6863a3cbe5dfca91237d75d15ff700c6a7dc912f21c7ddc67ef0ca571022b20c1f6607bea25e625007891349d9e6066f837571938
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD500abba01111f7a4334a60e6425326d6f
SHA193b3dcf547f9a54e5b983d152b9bf62c60e08906
SHA25617aa9d74e78201785b5ec3f00d414ddc49d040c3c0baf3ead4c141cdf9bd1285
SHA51257ae958d8de60c3ae76b165f8e3e3945f94f20ae5998abfe122856af2f032ddc42b2e1ba81343b64890dad1499f8e1e0db7af96d17fe0164177491c7b6078483
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5f3ac1b5b6e5c14c760421d351aa6f03c
SHA1916788aee5ee838e53f736a49a251fbab99d005a
SHA25698abf88576e725ff2e6e02ac611594f7efb35d8b9cb93cd931d2583a62a1479c
SHA512bf99164c70afb679d662452689fc4a5ffa3bd434d4961d1934dcd61c0f0f0e145168f638a3af24f52b67802ca7054b858328a4cfa65cd11e37748435df55fd00
-
Filesize
950B
MD5104fbf3c07337e217d62bc5b61c5e712
SHA18ed6ac2b67b64873ba141a114c6ba76a85771925
SHA2566923a623e24b72b821f8acd40070d556fbbe8154a0b79d7b06d633109bbafb0a
SHA5125ea7832298100d5549abfd9577482996b77e471d1e5068299f2283c17fef04af47489744f86c56a8ace05257a98afd58be7be3a8803690af80ed4bdcc9718e26
-
Filesize
58KB
MD574bc243ae7a708ff855d909cd335015e
SHA11ae8eaa354fb74477eff655768044fbe4c70061e
SHA256c1154d35742a0359eb645c7b5db4590096de42bfaee33701ed17758bed0ce8e7
SHA5128c73551601b6683cb417678b6f9306333c7f7ab87ec38a3a2b6e16399e9ea58dd6e21b8de28dfb215bd3d64669095a1fdc3af40ab45963f7824fc434f91b75e1