Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe
Resource
win10v2004-20220901-en
General
-
Target
344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe
-
Size
457KB
-
MD5
6fa26bc6676835cce3fcf6de88176939
-
SHA1
1c0de553a2594a623a619f8afe00dd769b85d087
-
SHA256
344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f
-
SHA512
d11d2ccd6bd8dbfa6d6e74f019d1d98e30bd29f4a2aba0322556ae7268c4dc0cf4b2f3de69694550f58704d6156f0cfc2087bd9043599b353a052f5b42abfd4f
-
SSDEEP
6144:Jh6zQGkqO94lxnbBRk6el/NjZZYCUqG6qMluExPEQODsy/gvOvJ9Ji1Mxw9cXZE:iXkj4b9R3y/Y3NEeQOQycYw1EpE
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4816 16_42.exe 616 16_42.exe 3972 16_42.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4816 set thread context of 616 4816 16_42.exe 82 PID 616 set thread context of 3972 616 16_42.exe 85 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\eac65e77-42da-47b0-bb4c-92c8960fcd93.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20221210133753.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 812 msedge.exe 812 msedge.exe 1536 identity_helper.exe 1536 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 812 msedge.exe 812 msedge.exe 812 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4816 16_42.exe 616 16_42.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4816 5052 344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe 81 PID 5052 wrote to memory of 4816 5052 344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe 81 PID 5052 wrote to memory of 4816 5052 344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe 81 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 4816 wrote to memory of 616 4816 16_42.exe 82 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 616 wrote to memory of 3972 616 16_42.exe 85 PID 3972 wrote to memory of 812 3972 16_42.exe 90 PID 3972 wrote to memory of 812 3972 16_42.exe 90 PID 812 wrote to memory of 3096 812 msedge.exe 91 PID 812 wrote to memory of 3096 812 msedge.exe 91 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 4556 812 msedge.exe 93 PID 812 wrote to memory of 2388 812 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe"C:\Users\Admin\AppData\Local\Temp\344249e852ae3b450927291922e5d2561c36fa5b100abd5e7e0783d6fc5db19f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\16_42.exe"C:\Users\Admin\AppData\Local\Temp\16_42.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\16_42.exe"C:\Users\Admin\AppData\Local\Temp\16_42.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\16_42.exe"C:\Users\Admin\AppData\Local\Temp\16_42.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=16_42.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffdfb446f8,0x7fffdfb44708,0x7fffdfb447186⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:26⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2200 /prefetch:86⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:16⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:16⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4916 /prefetch:86⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:16⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5428 /prefetch:86⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:16⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:16⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:16⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:16⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6708 /prefetch:86⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings6⤵
- Drops file in Program Files directory
PID:948 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff75eba5460,0x7ff75eba5470,0x7ff75eba54807⤵PID:904
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6708 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:86⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2156,10529231538696538885,7193093368195815695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3356 /prefetch:86⤵PID:400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=16_42.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.05⤵PID:216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdfb446f8,0x7fffdfb44708,0x7fffdfb447186⤵PID:2852
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8814439123c54cbc8e61bb010a24511
SHA1403ad16668fc85e4ef366f00749eaec0f88b94b0
SHA256ee60f00dcded0ed07c9c88d582efde48ddc73d1f1a28081d5e2dea006c4ac894
SHA512de05eaa43d562783009cb1ade9c87f3d1b1020c951067d2f95dbab698b5f35271790bb9a547dd30cacf68783e09a4bdd1dfbfcf8cf53343b132b9c3d6c4d2800
-
Filesize
324KB
MD5e56abf4b5d74081a8f5de977ade7cdbf
SHA10894b5b4201d5f044876c5adeadb4f0c0da19eb8
SHA256ffab9b2ab0f1d0cc1ad2b375b2b26f7e0e6046e1c6e6ea94fdec9b60968f611a
SHA512c59d34e9db9bba9630a6586f2a78ed1d8af90836c11f6021257f7eab54e7166aaff8893e729059165f9d00ddf1d09d68c25fdd122ddd3e0483e310a1946b19ce
-
Filesize
324KB
MD5e56abf4b5d74081a8f5de977ade7cdbf
SHA10894b5b4201d5f044876c5adeadb4f0c0da19eb8
SHA256ffab9b2ab0f1d0cc1ad2b375b2b26f7e0e6046e1c6e6ea94fdec9b60968f611a
SHA512c59d34e9db9bba9630a6586f2a78ed1d8af90836c11f6021257f7eab54e7166aaff8893e729059165f9d00ddf1d09d68c25fdd122ddd3e0483e310a1946b19ce
-
Filesize
324KB
MD5e56abf4b5d74081a8f5de977ade7cdbf
SHA10894b5b4201d5f044876c5adeadb4f0c0da19eb8
SHA256ffab9b2ab0f1d0cc1ad2b375b2b26f7e0e6046e1c6e6ea94fdec9b60968f611a
SHA512c59d34e9db9bba9630a6586f2a78ed1d8af90836c11f6021257f7eab54e7166aaff8893e729059165f9d00ddf1d09d68c25fdd122ddd3e0483e310a1946b19ce
-
Filesize
324KB
MD5e56abf4b5d74081a8f5de977ade7cdbf
SHA10894b5b4201d5f044876c5adeadb4f0c0da19eb8
SHA256ffab9b2ab0f1d0cc1ad2b375b2b26f7e0e6046e1c6e6ea94fdec9b60968f611a
SHA512c59d34e9db9bba9630a6586f2a78ed1d8af90836c11f6021257f7eab54e7166aaff8893e729059165f9d00ddf1d09d68c25fdd122ddd3e0483e310a1946b19ce