Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
66fb288e71fa3fbcd2b49d292f1938f6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
66fb288e71fa3fbcd2b49d292f1938f6.exe
Resource
win10v2004-20231215-en
General
-
Target
66fb288e71fa3fbcd2b49d292f1938f6.exe
-
Size
71KB
-
MD5
66fb288e71fa3fbcd2b49d292f1938f6
-
SHA1
d43b8f5dd1051eff35c5e1a87918b26a360187b0
-
SHA256
864dc421ddda3032938a5f1753ebc4d24c6250cd201204c4024012fe2b8a460a
-
SHA512
f066628c9881768e7f4419a6205d52a3368d19845ae6cdfdb9fab096c2a261e70267a332388d39a2e948dbd2000d70de534ed6b068b2accce24e0a85024c3934
-
SSDEEP
1536:twW5v5ShTLys41asnXrkn8vaUAPJ6AlNQDAo6PU4CR:twW5h4TLys4Bn7kn8CUAB6AlNQDePUlR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 66fb288e71fa3fbcd2b49d292f1938f6.exe -
Executes dropped EXE 1 IoCs
pid Process 1032 inithost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\inithost.exe" 66fb288e71fa3fbcd2b49d292f1938f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 4900 msedge.exe 4900 msedge.exe 3052 identity_helper.exe 3052 identity_helper.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4900 5100 66fb288e71fa3fbcd2b49d292f1938f6.exe 70 PID 5100 wrote to memory of 4900 5100 66fb288e71fa3fbcd2b49d292f1938f6.exe 70 PID 4900 wrote to memory of 5056 4900 msedge.exe 69 PID 4900 wrote to memory of 5056 4900 msedge.exe 69 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 4336 4900 msedge.exe 81 PID 4900 wrote to memory of 1188 4900 msedge.exe 80 PID 4900 wrote to memory of 1188 4900 msedge.exe 80 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76 PID 4900 wrote to memory of 3728 4900 msedge.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\66fb288e71fa3fbcd2b49d292f1938f6.exe"C:\Users\Admin\AppData\Local\Temp\66fb288e71fa3fbcd2b49d292f1938f6.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://vpn.nic.in/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:83⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:23⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:83⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:13⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:13⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:13⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:13⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:13⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:13⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:13⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13361859193168096683,16172478262255354391,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1368 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
-
C:\Users\Admin\AppData\Roaming\inithost.exe"C:\Users\Admin\AppData\Roaming\inithost.exe"2⤵
- Executes dropped EXE
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff086946f8,0x7fff08694708,0x7fff086947181⤵PID:5056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ca34c7e6078ca0ea18d03d670ed51d97
SHA1006bfb4b315e43de813e470f3a0fad94b65f0805
SHA25667b0c6541c70e4f64f56e0322ea53cf8499a02f85dcf3e19b0c6e17053a05171
SHA5126ed6c62fd4b8b4ffdbba407678f937838ef0c58b6b1a2c82156977619dc2f719341cdab6e4b84c746a0218636e20f68a7fea6bc35c6aac2079357adf985b763d
-
Filesize
5KB
MD55df8594bbd8f105f6a92dad9db9b28d1
SHA1b392bcf38e2efbc39520cf659fe91e3b04ed90f7
SHA25682092b96be38a5c23d8e5da3c5a8223403eed46c019fb64a2fa3d077286bcc68
SHA51268bc395978bb1fbfd1e77e0aa4257d35284c22de1d6e3c5ad31a668f6f7acbe669b9495ad6b9ebc526395f6a21adaa5bff1d8a2f14173bf51b9a5d5673872942
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD575448e5cdefdb8eac6d1c0460f97f4dd
SHA168ec03de1851f21b39476b2db6007a49a6b4050e
SHA25696ff8ad20926955da9b118fe607d10dcd4ff0a0b33e582bf0bf0c0ba9f3dc0aa
SHA5121ff0bfecad890a606a4dedb195b10d5ce403126e8f4e4d43bb769c6cf1a89475dadcbcf9b6dd88da2a043343bd66c943b82d9510ace5991af54b337733695834
-
Filesize
15KB
MD5c1d4cd3f7d5415127ca216c696faf3ed
SHA120777d706729a819dbdaf225b7e6351b89f093fc
SHA256ee2cc931d5b4bad780abb0e5cee7d9bb51916035e4cce0e8239fe0a444ed523d
SHA512dc729a057fbc3d340c40426cb11ef47d93db8fedc1a8d411cbcfa6ce3601f4a52d504353f48dac93634fd44a52c941080a4bb15caf1d71ea3bc3c5dcceb30574