Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 17:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 2760 msedge.exe 2760 msedge.exe 1632 identity_helper.exe 1632 identity_helper.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe 3580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1100 3580 msedge.exe 87 PID 3580 wrote to memory of 1100 3580 msedge.exe 87 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 3152 3580 msedge.exe 89 PID 3580 wrote to memory of 2760 3580 msedge.exe 90 PID 3580 wrote to memory of 2760 3580 msedge.exe 90 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91 PID 3580 wrote to memory of 928 3580 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://r20.rs6.net1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe84eb46f8,0x7ffe84eb4708,0x7ffe84eb47182⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9138390326434357844,4218297155528428968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD57e8fcfaf44139dda0ad2615fe0d4af63
SHA1b1ab74e0e75f60a013b553c1d7788cda069762fc
SHA25618aecb42b7392441d065d1e83223602f52d7f19255186ef4089212433c0d05ce
SHA512e18f074e95cacfe0e05f069fe645369e1d6982b6d5947586152c511b64fa5b4adfc4190bd9a9510b8133c5c9b06c08d67a70670e5df7095254cdb5c8bc35abb5
-
Filesize
1KB
MD5b08e85517c41597298f9f838c1e8c5b6
SHA1e1a4822e081170fa9a1f26da2f9ddde9b04a2142
SHA256ad4df9aed78eb598908ea0bc1940277658455671b08e0d9c057bc22a6440180d
SHA512ed9d12b7358d182d5c628bea9d92d32d54172f9b0f21a15736e13a61a494330f3d334e38da2206482e7ed78686940b9e59ee214444c2c5145123aed05c762a6d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5af82a78e367851a428018c9061ea6336
SHA13222a731c663e114e1f1d649d43612e9f42c3d69
SHA256e4385a8b613f4a64e696b1987d2b86b1641d6701829d9f64b2a83052612aed0e
SHA512f2fba775746aa01e4f96007458912709c683c72f65517285a099c1f1cedf578ee184b07a814e1f7c87c2b6b780cbf9d5d0fc1ee839df151d049ab0ce4290ca8a
-
Filesize
5KB
MD5a55b008439bb429a7a4a4511b6de493f
SHA18ed6bc20d526a004eb0914c83e0d0305d4c80525
SHA256bbdb254275ae287f1523c2618df947335b14cef1e546f07fb13353805297cbb2
SHA512484604275679aad9e547e8460bbff8abc040d9c432c48812eea3e193e5d33a951ec2c1a91bf263fc0279a5cad9b2a82b7922c3df5548e5576c5fad2b0bd684c8
-
Filesize
6KB
MD5d0c6c9557c5eb4fae0ce3a00516b4322
SHA1c23ae2cc8e1ac32de50202375a53598542273377
SHA256ac933073d26fe64a617f057b73bf59f33decca8e957a550addd4cc8f45f71d4b
SHA51221a67d80cd5892bcb1c12954eb3a95c96cd923b9736f52dcecd1e04c7f6c734bf1abc823f9748075a25d9d7daf42a1b2ab6e02df9c388df869ac0e285b922b47
-
Filesize
6KB
MD51bc7eb41016f90cffcbf3b4fcd52e580
SHA16b52931d24b8cffbd4ddcd405b973ca539f96aea
SHA256ebc48baf5afd396253fe63437d6fbb2a1d145c4d49ebae88a974dc5fe563e67e
SHA51252396359be653db2b5d3bde992068bbc572e8188bb28cc232c5e87324d25adf27b745781cb36668c5ea2c5aaefa6791cf96acf31b989fdf8c1d29cb89a3af10d
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
874B
MD55a553b20f64d5d275d9a5d798dd8166a
SHA12e4f028bff6f065619894aa9a03c1ab5390e90cb
SHA2566678c8cb39aca87b7a041b243ce14f1d301daf83883419facdbb9c03968367d3
SHA5124810e5c3023501f5b480539255708f22556b47f9894f6aca0b2b4e2ab5cb226586a8678da22adaa8bc95690661b34a14b30968821db18c5402336c8caa95e7d0
-
Filesize
204B
MD5ce0e0ed41fc24ffa4bb2f219fd0d1ab5
SHA19a7ea9b0941b325af0e0cfb9aa3fcb1e83f793ac
SHA2566f489e8abe588c746ff8001113ddf5f495ed20a9144913f989ec23212c3cceb3
SHA512a7dd90443f23744ec4454b4bfe17ae0bd9e8272d8b56cbbf70787a46fe41e530c7161a95244f1228a27c2fc1a2603cc3eb9c481fb705da829690a3d46a311b1c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52cdc15cf55c727c87180d841c04d7c91
SHA1c9d163140f42fecd73db3fe147bbdadbd3b99061
SHA25649044e27136aeb7e0e2219324cfe188e6ad78d08edc5e22e9aa13ec95d6df41c
SHA512484fe0e7e1e6e7b8a99ee3f3efef9c61053d68b1a545bf103289bee885684eb7572d7709517fcb8d3a6a9e9a0d054c517a321d452211b7624a9695075553c615
-
Filesize
11KB
MD522fe0b96b96bc9a6c0e3106796aaee14
SHA10d04b3e0147626298d6bb8db928d2865790a027c
SHA2566de905343f9a709197d9d4e4ebc2d35083860d5fc820dbe379622f41865a61e1
SHA512ef5c0ecaa4a1fc58a5bbc885badf958d18581dda6a5f73af17fd528ce84bed77b6d78e7a3812dedb0537187836f0f4543187a6152c050ee68b1a31efad8e9a5f