Analysis
-
max time kernel
1680s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://f
Resource
win10v2004-20240226-en
General
-
Target
http://f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 768 msedge.exe 768 msedge.exe 4192 msedge.exe 4192 msedge.exe 5036 identity_helper.exe 5036 identity_helper.exe 5832 msedge.exe 5832 msedge.exe 5832 msedge.exe 5832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1248 svchost.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 2664 4192 msedge.exe 87 PID 4192 wrote to memory of 2664 4192 msedge.exe 87 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 396 4192 msedge.exe 92 PID 4192 wrote to memory of 768 4192 msedge.exe 93 PID 4192 wrote to memory of 768 4192 msedge.exe 93 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94 PID 4192 wrote to memory of 208 4192 msedge.exe 94
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://f1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8425446f8,0x7ff842544708,0x7ff8425447182⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2256 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4802767372936040193,17687444712984205977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD580baa453d45278e55717588cfb13fbb0
SHA163eb9c81d308bcb609fb26edebd29d89941dc168
SHA2569aaa707e8930183741ece4a1075191ab62af932c7945a23e92c433e6c71434c9
SHA5125bc8f02c4fe83f0e7e4803807655dfb3995b20b6718159512808ae00cb7afcbdc3d68f5522c9d48e1e6ac7f44a5b0d2a1d0d570e44525a0774b49415b3c8b975
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5b67a1b0d56db2dda16d66a2fca74cf53
SHA1dc5f9315974dac878206b6457b2ca5add6c005ab
SHA256471106c74e87196a2c7ebdbd8e72a03c70064c52fbcfda13548a03d0829c1dd2
SHA512a43574fa5eb03f8801a7878ec6b5541dd02935c9b305f6b5bfb0b4e1c42609820e6636cd953079c7a295ea30f66f751e9bc76a5cde9dda01cb0133ed1e544c6b
-
Filesize
6KB
MD57943197d8ae247bf96cf2060ef199267
SHA1e6585f077d0c50d03ca64a22c7972d64b4280ac3
SHA256f9f89e83a36ff903da96f3c1394b2422adbc70b305776c673b233a81573d6877
SHA512e6a75df0499af409d4385a35f28b4f2997c40b75350103f2e40b2a87f080f0972001aa24dbe3160881d71b21ba33235726ac4a41607cc1e661a4bb62588a9976
-
Filesize
6KB
MD54fff927a3fce7ee565200b3a511b0f4f
SHA1a7719b5b771abe8dceaf603129173c8f0316257e
SHA256486176d7722009d0f3f9b651fb7c5164f0bbe6f7d69fc6d9ea6c0b335bef5f1e
SHA512164af3453c9d03ea20278b347a0a4d2d836d661592c83dd102e4bc20e8c36e5154eaa04d40f7d975ee15c1e57f38942dc6392e4448946e7e504976dd9c1bb528
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5fc66ecf80c97dcce01191a7dcee68554
SHA15c8de2c520feb763804cd9a51302d768a91f2b78
SHA256e7cd96885464d128e89a357b3169c28784a1fca192b87e3fc8ec80e834a08d4d
SHA51221888eea656cfd89d096b131afc7cc5493c0f606e7aae3e0e6c95f33cef99a9db4bd2ca70762aa0b3020f58424baeb4247b441fdbb053a3cf441ba32b9b4b249