Analysis
-
max time kernel
157s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
5088edf59690e8770379b2ca4db9ac02.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5088edf59690e8770379b2ca4db9ac02.exe
Resource
win10v2004-20231215-en
General
-
Target
5088edf59690e8770379b2ca4db9ac02.exe
-
Size
166KB
-
MD5
5088edf59690e8770379b2ca4db9ac02
-
SHA1
66655bb81d8ade8b669e163e48457f2836561bee
-
SHA256
320d05422fe57d1b818cdfb2880ba3f7b44892d855450a20643f794f1994e68f
-
SHA512
1a686584e0414154908c06e4e8d5f34fe06ea262e3b11e8053998880a0c1c1728698177f184d8d799df609cb4bf0afe49c623dd40722c1f0d448cba81c143d61
-
SSDEEP
3072:54jqyS9BRqKY5nSR8a5utR42/B4Vj+2hINF5LqU5Ffr3DVqVF0WH9/:54jqyS9B0KY5nSr532/B4LaNF5LPDhq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 4628 msedge.exe 4628 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 5076 1784 5088edf59690e8770379b2ca4db9ac02.exe 92 PID 1784 wrote to memory of 5076 1784 5088edf59690e8770379b2ca4db9ac02.exe 92 PID 5076 wrote to memory of 2480 5076 msedge.exe 93 PID 5076 wrote to memory of 2480 5076 msedge.exe 93 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 1972 5076 msedge.exe 96 PID 5076 wrote to memory of 4628 5076 msedge.exe 95 PID 5076 wrote to memory of 4628 5076 msedge.exe 95 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97 PID 5076 wrote to memory of 2136 5076 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5088edf59690e8770379b2ca4db9ac02.exe"C:\Users\Admin\AppData\Local\Temp\5088edf59690e8770379b2ca4db9ac02.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://sombrasil.ig.com.br/musicalcards2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe323146f8,0x7ffe32314708,0x7ffe323147183⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:83⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4360 /prefetch:13⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:13⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:13⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:83⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:13⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=188 /prefetch:13⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:13⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1804 /prefetch:13⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:13⤵PID:180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2038686009190005661,4321542210044051502,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2936 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3380
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5fd380dd8c700bbb818e2f17f6633bed5
SHA15c2e74aeb99b4e30f3bb0c0cc536c64ce94a799d
SHA25689e8e296753ddc21ef8df942102e780995a303d5f904b3355e41bfc52f60fd50
SHA512aba63c5bffed79e2cbe29adc7300b7ac913eeb93b60e1f05c988aab52428f3bb3837a223de1c6123575d484de9173bdb5b08e38ee9dd575f40005ef058786261
-
Filesize
5KB
MD5be701152e141c129dadc3b2f41065edc
SHA16fa7f6d78d3340ebc841a75cc4394532fc71eaf9
SHA25689ff02da187ba5613e263ee284e79a5a3c040696f8389dc99cdeac4d642ab43b
SHA512290fccfbc9edf3bd857acb41261721bb5affd73fce1668ee61390b9bef6d5f9b9ca31af12914f44391039fcd916c5bb875e4b540956aed0d246f22634f486166
-
Filesize
5KB
MD5c0d232322172c96509f8064809446b44
SHA17f66a72e59dbfed4794a19a93da3bfaa2e7e56fc
SHA256c2fc4cf8b813611b3f15e688bad826707648e388f6c1330d0c8ac2bb6b330577
SHA512793b45d31a277bc35920e738832455b4e0466909bc9234164107b335eed08cafe82a43ac18336f0856f6af920c1ed87ae7eb984ab8e5fb225668c806a0550442
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ffe025ab9d41db40a7bf9fd1a787e4d7
SHA1f8fc2fd90e7339f1eecc4f24563f456555136444
SHA2566903a1143467525466d3aa85c66fe86625ea3a9b7970581423a1acf1bab48f50
SHA51235da3c8c5ef0c8909c22714c1fba6bf8719d4fb6f572a2d7c64fd2d5a15fb26ecb3644768ac22a3d8e76e93d59468aab515daa5cb93b820dab1c4c24809f6a5b
-
Filesize
10KB
MD54d559c1617001d8524b573403de07a72
SHA1ad050b35a7f32ea25c7a0e84cbf1aaef1ca7cc2b
SHA256a19260d4088b34385654c97ba8ee7479465f701b7b8a936deebd0fe7e2dacb22
SHA51249a7383444f9cadd982e3898f8327dd02f639095a42c773e3b52185e2a9857706a7123c17ccf5bc8286d08164e101162a313a6a30a24ece05686bf1e32152fb2
-
Filesize
11KB
MD5e3e3e13ad5e53b7708af0a2607f5d5c6
SHA1b67b61a1ecdebcaa59fc3a257f63254a1ed2caaa
SHA2563e5b4df4d1065ef85d6e7ddc3b77c728cb55b34b019780a544b530900202408d
SHA512a3f2b8b21b359a5e5531cec26d3521c65d5d96354087ba9a86613a21203633bedcb474a48098727acfec26d07277b84e26626db63db6327d118b583a57ea7d4b
-
Filesize
12KB
MD5d0cc63b0b8cd771dced1749c6d1e3906
SHA1333cced55d727589124cd4c52f9abfea2dca5331
SHA256f7391ec8b47490131ea1618c1e8e17564a7499024abaa529a36f96f8306c44e6
SHA51246bacca2a65752b7aa7f8c57263bdb5ca9606499ac050032e24e646968f75966bf55def6ab7d477e1e3f25e50c7bdf9c8bb330495b0ba00b0ab6f0ba8aa9836b