Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe
Resource
win10v2004-20220812-en
General
-
Target
d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe
-
Size
60KB
-
MD5
0c7faadcd30a616885c1e111bed6e640
-
SHA1
04b4f048daeeaf49007a07a5c6e5563a4b04e009
-
SHA256
d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035
-
SHA512
0dd0e9553f9daf23e3789cea32339268b74919f4ccb56c098b024156474bc94bb6e249ecc70b82b0db9ae85f36aefa9039aa71561149c982a8c741b2645550cf
-
SSDEEP
1536:c2UwTY/oKaRIo2fl8baRYX2NCancRu7AlSfZEPCNIj2BMshq3Q1+Lk5zGdYfSpUq:ctw4oTRp2t8baRYX2NCancRu7AlSfZE3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\89dbb0ed-c855-4244-b158-4b13b2c6748f.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221107082614.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3780 msedge.exe 3780 msedge.exe 4404 msedge.exe 4404 msedge.exe 4836 msedge.exe 4836 msedge.exe 2560 identity_helper.exe 2560 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 5092 1224 d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe 79 PID 1224 wrote to memory of 5092 1224 d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe 79 PID 5092 wrote to memory of 3028 5092 msedge.exe 80 PID 5092 wrote to memory of 3028 5092 msedge.exe 80 PID 1224 wrote to memory of 4836 1224 d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe 81 PID 1224 wrote to memory of 4836 1224 d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe 81 PID 4836 wrote to memory of 1028 4836 msedge.exe 82 PID 4836 wrote to memory of 1028 4836 msedge.exe 82 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 1180 5092 msedge.exe 86 PID 5092 wrote to memory of 3780 5092 msedge.exe 88 PID 5092 wrote to memory of 3780 5092 msedge.exe 88 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87 PID 4836 wrote to memory of 3036 4836 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe"C:\Users\Admin\AppData\Local\Temp\d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8162c46f8,0x7ff8162c4708,0x7ff8162c47183⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,13255463427485323758,8352422806106895854,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:23⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,13255463427485323758,8352422806106895854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=d6bb38bbf893512d6912e9396457805f85232353f5e06c94aac55d84c162d035.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8162c46f8,0x7ff8162c4708,0x7ff8162c47183⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:23⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 /prefetch:83⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:13⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5196 /prefetch:83⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:13⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:13⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5964 /prefetch:83⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:83⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x258,0x25c,0x260,0x234,0x264,0x7ff608f55460,0x7ff608f55470,0x7ff608f554804⤵PID:3628
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:13⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1516,16117813213797927294,2944681829141896841,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:83⤵PID:1628
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD5727230d7b0f8df1633bc043529f5c15d
SHA15b24d959d4c5dcf8125125dbee37225d6160af18
SHA25654961bcb62812886877fcd3ad3896891099cc4bddc51ea6f07a606cf5124d998
SHA51235735f0dadf7ee69bcccd5e9120d6a55db39138eff58acbe4ea8116fb007c54a024028dccd5f25856ffcf33e1f3bdccfd8d0e2527130a16351debb04c27b8df9
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
152B
MD57b4b103831d353776ed8bfcc7676f9df
SHA140f33a3f791fda49a35224a469cc67b94ca53a23
SHA256bf59580e4d4a781622abb3d43674dedc8d618d6c6da09e7d85d920cd9cea4e85
SHA5125cb3360ac602d18425bdb977be3c9ee8bbe815815278a8848488ba9097e849b7d67f993b4795216e0c168cdc9c9260de504cccb305ff808da63762c2209e532f
-
Filesize
2KB
MD5467f75d1e5aafc416d9c70c990c1487b
SHA1189674e5e385ba8c4ed1929e0cbc389c40e98058
SHA256409a87ae5f2340d0acc48ccf644854a150d88b2f59f2daa540947b04ce5781bf
SHA5121c77f4aa140e91d31b5609df23f89a8443e95591a9451febea95edc6d30899bb911473b1e8987c705fb0e881ba9dd20b960c3e0f942f8700cd52b10fdb436946