Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/02/2024, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
Nouveau document texte.txt
Resource
win11-20231222-en
General
-
Target
Nouveau document texte.txt
-
Size
76B
-
MD5
8cbb5483765db903966c77908e33eed2
-
SHA1
354ffaf98fbfccfcc28bd01d0f7750aa17451f00
-
SHA256
10c33fb1bee390444430006c5274f928bbb45e87a944ff50fc33261d8453489a
-
SHA512
b2e1fde4ef28067ede595480a969d4d5fe369dabd1215055a9bc9ea6990d0c5e30bbf3a751fffd57188ff1c5097d091063da2fc92a752a2137d832addfed82a4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4286256601-2211319207-2237621277-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4286256601-2211319207-2237621277-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 340 msedge.exe 340 msedge.exe 236 msedge.exe 236 msedge.exe 3676 identity_helper.exe 3676 identity_helper.exe 2536 msedge.exe 2536 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe 340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4080 4052 cmd.exe 79 PID 4052 wrote to memory of 4080 4052 cmd.exe 79 PID 340 wrote to memory of 4440 340 msedge.exe 85 PID 340 wrote to memory of 4440 340 msedge.exe 85 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 872 340 msedge.exe 86 PID 340 wrote to memory of 3852 340 msedge.exe 87 PID 340 wrote to memory of 3852 340 msedge.exe 87 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88 PID 340 wrote to memory of 1692 340 msedge.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Nouveau document texte.txt"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Nouveau document texte.txt2⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc7db93cb8,0x7ffc7db93cc8,0x7ffc7db93cd82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1688 /prefetch:22⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,13790692332094025184,6432251156701358300,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:444
-
C:\Users\Admin\Documents\New folder\builder.exe"C:\Users\Admin\Documents\New folder\builder.exe"1⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50bed556ffeb1e69835b408d733b041f0
SHA1e2aec94abd489a26f36a9694c7ef3903af6409b6
SHA2567d60b9117a935eaba25d7273a5b5e8ba04ece22672661ecb37a3c8a08f61def3
SHA51247d492a7c72f9d12511f070d7d28451b1c52c5f0d446890e704b02bbc51330b1890c5ac4e050d514ff1bfd9c64421adeebee114718042af5aee3f5fdfb413fc8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6b704856-f6ea-4b50-9831-843843445ec2.tmp
Filesize335B
MD5bd6ad1e41587fef93b83b1cb2ff45356
SHA1774b417752e7287e2b69406126541d5e75145561
SHA2561dc7b2a82f7866582fa5ea332d5cce18ff2b266828c7f44ce5727185531d2d35
SHA512d304887123a07d7f3c55554e8f7c800a0580d0919442f235d4e8c718c5fe16720eb6e9776449cef895fc0f3ea82491a713ed2464eab92d8274c9a7f262ebfdce
-
Filesize
4KB
MD5ff3e865386ee5384a2641f1dedbffb4f
SHA1cb059254e6752dfe88b540f3581df40315097927
SHA2562ee9be7d89c4444d1390b6a00820c7ddd19ffa21fccf4d05749f03eca58d5277
SHA5129e82976b745e6430340d77716b271a6b533e724c473da6ecea913bff7337723f17f092bfcfd895dc8c39c4c74c3e5ef267d158eb270995095657d7f986d8196c
-
Filesize
5KB
MD53135781642eefc70df58aa620c415496
SHA1656924519c843c0bde4a01fa4a9aa0d8e473e949
SHA2563cdab9d8d275140cb096570acd3e44ac1abe6994f1851f4cc8a1fc2c316795b1
SHA512919af99ba9c3b7ca22b3c7cc44b9bfc54b148de2fa5a00aa7be90fade3f36fda51fe045a3d949cd04dabf4b3f2fc3dedfe31ffc6df6af9f45851d8d9700faf92
-
Filesize
5KB
MD5b90509e0f82af7f97206eac02b8e8b0d
SHA1347624474eb98144e68cd8b389269b3749c911f6
SHA2567f4f51e47728da60f6a40bf03164d6e44311af03d10cfda51be648daec17aeb4
SHA512b7013970baf71245f1d3676e450e2f89459d5b91b6b496bb868656a1b5858df452f80c899c66583986317c0afcb91fb16bff0ee70f60ccea37fdfd192a95b4da
-
Filesize
5KB
MD568e0ec0b78380269d928a47b1ac96d73
SHA16149ce10793cdc6cdc37111d60e8aa05a4ab2553
SHA2562c827a1b2192a78df36fd6dac16e941c30498b243dae2b70e63a0f8d71fca4f9
SHA512069b66e613f861d0c4ae72ae969aeb7758a2fbcd4147bbb9817907f3d75baa4b82a2448555a8d02f5cf761457a5fa7fdb57196745728cf85dfd72ba6f07ed3fd
-
Filesize
25KB
MD55e1542ec05a1840cfb56ae87d1c2e16e
SHA125bdd95b83b7c614a6446609cff6ecbcab58d9d8
SHA25641acd6ffea81ff1b8b58a4693696a397817473eb899edbf6606314820a8e40b8
SHA51212c32368cbedc3d2515907ab740c75022fc4eaecec9b45734f346db0df209e667b066b2fcd891e84193868ecec8b892e7b484c66a8b329562bad53a69b25c0db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5783df0a5152a05ef7a4dcc5881a4f766
SHA19f2402a14f95256c8a02812e104939239379705b
SHA2560b0468a5a50c514686eb34e3a50be1bd9bc5086132bcbe373469547bd5115229
SHA5124b3a01a0b7e33eedefad5dd9eaad4577be23604e55f5d962d1628340a5830c99b0a23498bdef72a8112c2346432534809a4c1c297090a03ce7c09d85f802b377
-
Filesize
10KB
MD545e3a9220a9d72824ec82e7e815b8b4d
SHA1c68e2f17670a4a7bdf365df917f9f56a0f4eecf5
SHA256762bc5a7ddb6c6fcbef179d1b652280bcd0f7f0d3fee88df184f3aba2c9a2ac5
SHA51265c2fb6c452e7432c182fa5bc2392e775a49e55ad2730da02290b4d84801e65f92865beec3c1184c10bc50733248b08c4bbc714835f71fcf2480ed6268a5786a
-
Filesize
445KB
MD506a4fcd5eb3a39d7f50a0709de9900db
SHA150d089e915f69313a5187569cda4e6dec2d55ca7
SHA256c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
SHA51275e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b