Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
ab9d81d781a985b68982e8ad4ede84cc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab9d81d781a985b68982e8ad4ede84cc.html
Resource
win10v2004-20240226-en
General
-
Target
ab9d81d781a985b68982e8ad4ede84cc.html
-
Size
432B
-
MD5
ab9d81d781a985b68982e8ad4ede84cc
-
SHA1
72dbc1df54a5bfd58456e54204c173528d601012
-
SHA256
874967c15a3b64f0e82d92bd0e74276e94c49202c9984550407edd7dca4cf1a4
-
SHA512
b4aaae619decf35e29e46cbe456cd58164a870ae846860ed9119288f07f8fbe86d5d4eba40d25bf38146e178c64288423a25316d94bca2eff1564d6c7d6d60ff
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 4332 msedge.exe 4332 msedge.exe 2900 identity_helper.exe 2900 identity_helper.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1600 4332 msedge.exe 89 PID 4332 wrote to memory of 1600 4332 msedge.exe 89 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 208 4332 msedge.exe 90 PID 4332 wrote to memory of 3772 4332 msedge.exe 91 PID 4332 wrote to memory of 3772 4332 msedge.exe 91 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92 PID 4332 wrote to memory of 4188 4332 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab9d81d781a985b68982e8ad4ede84cc.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff86b846f8,0x7fff86b84708,0x7fff86b847182⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,6674854432389174746,16426319897003450550,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
Filesize
425B
MD561db3ca2afb1c79c4f96d9871953e1fa
SHA16c4408ff7c6cf3e07ea3c18031381f10d178f357
SHA256592a5bcaeeeedde50f547d5d6dcf566dad8dab6220b862b2d4e09e5cc97283c3
SHA512b8e6b082c7f230109c76dbebeb0dd037e4010a83a3e9abae8d4b20599ad63d0e27d328f27556a54e7113bb834a02dd0c3ad348d1474df4171affda39478831ac
-
Filesize
6KB
MD51216133a074c0e85318a3de8132913b0
SHA1f985e7e68b14308cc0da0f9b914b0a3c5bb32651
SHA256da19b28aa51aa977d771ec5935fda05c95c290dc87d1c5a3fe100ad678985704
SHA512bcad47289fea447254a7599dd04ca94208fc43839304b719740152e93e4294840c4a50f4f5fa722669f0c314733128ff0161d7cfa40fb65c96e7918b223abd58
-
Filesize
7KB
MD59794c59fc6d84cc246e6bf0fb6163538
SHA17c0c383651c93b03fea0050cff37eb94f033a957
SHA2561f1b8956ca6966ece7b79e3361d2a5b46362cfe99b6753f97cccd255385085cc
SHA51200094b5ec14e5006dfea905206170f9cd7781e7736b38d591f10190a6e62d48469fb16f47cb004010c680cf2f2e6a58326e60b9c43a83680fc0f34b4fb36a347
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD523f98498d41e5fd3f19192b4991b6dd4
SHA14305328e9503a0628995e709a789be502c23c3b8
SHA25622cd3269b7c6a047bef84b75c23e380f8f4d5e26ef981e4f317a73ca745e28be
SHA512b19a33bd3fc02fb8fcbc8bdd971a08f114e50693d1400f7c0361def41b8069dc1bcd901f62ec0d30b354061f527f8f1f89f17c8e9ab8ab54000415e4693e8b4c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5786a5.TMP
Filesize48B
MD59e650c4e3c516c8d3ea593a4743d4b5c
SHA1f8822028404e4da6728ded507e611b614e74c5b2
SHA256e59fdd1d790e0625529852c3155e2aa7671a42aded40de4f85f6d247f8856632
SHA5124701133f3711e10871fb638d3ea739f3212e1ef569ca790478e3d3312d2dcfdb652fb225124a304595b2830742cf0ffe4e1fd88926c5d4d9fb9399d645f467a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f9887a119749d78affe6ce6027f0689d
SHA13c328927f9b291f86ccfc8552c5b6c308d08446b
SHA25659c5e60131eec1b4de3d3caf47c750a16bb171c60e959698e0cfb65f8b32f0fe
SHA512c8122094fe5c20b54b8fd22931a61ab7d885ddbe2821c78251e0f91afbdba95c0bb401a46752bcb60d4050854b189ae01a3ce3f528baa62f83c0c56a358e9ff5
-
Filesize
11KB
MD5ab5025a8aee4bc13d56f0e9016472a8d
SHA1d266adf7bc9ff4a36fd211f14e0e2288735d0f0e
SHA256c8e11d792a4c6fa533ee7dbe012dabcc9f349900edaab5ccad10d6e471b00410
SHA51256d76eb4b7ec6ca9c846efbdc772678751964eeba50d47e8b31ccf7d9ab80df9ba57bc2d8d35e8ef8b470eaeb3ebf78378c9ba5475114f7ce2d673eb516ad967