Overview
overview
10Static
static
101680kb DMF...er.exe
windows7-x64
71680kb DMF...er.exe
windows10-2004-x64
7AntMem v13...64.vbs
windows7-x64
1AntMem v13...64.vbs
windows10-2004-x64
1Atlantis N...is.exe
windows7-x64
8Atlantis N...is.exe
windows10-2004-x64
7CSVboard v...rd.exe
windows7-x64
7CSVboard v...rd.exe
windows10-2004-x64
7Encopy5/encopy5.exe
windows7-x64
7Encopy5/encopy5.exe
windows10-2004-x64
7Eve/eve.exe
windows7-x64
8Eve/eve.exe
windows10-2004-x64
1FoldersRep...ep.exe
windows7-x64
9FoldersRep...ep.exe
windows10-2004-x64
9FoldersRep...t.html
windows7-x64
1FoldersRep...t.html
windows10-2004-x64
1MICROFTP/MicroFTP.exe
windows7-x64
7MICROFTP/MicroFTP.exe
windows10-2004-x64
7PDFproduce...er.exe
windows7-x64
7PDFproduce...er.exe
windows10-2004-x64
7Password G...pg.exe
windows7-x64
7Password G...pg.exe
windows10-2004-x64
7ShackUp/ShackUp.exe
windows7-x64
7ShackUp/ShackUp.exe
windows10-2004-x64
7Spread32/Spread32.exe
windows7-x64
7Spread32/Spread32.exe
windows10-2004-x64
7TheGun/THEGUN.exe
windows7-x64
1TheGun/THEGUN.exe
windows10-2004-x64
1Xcalday Ca...ay.exe
windows7-x64
7Xcalday Ca...ay.exe
windows10-2004-x64
7Xpass/xpass.dll
windows7-x64
7Xpass/xpass.dll
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 07:16
Behavioral task
behavioral1
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1680kb DMF Floppy Office Xtort Homage 2021 Edition/100k zipper v1.21/100ziper.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
AntMem v13- Try to Free 64mb/64.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Atlantis Nova/Atlantis.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Atlantis Nova/Atlantis.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
CSVboard v1.1/CSVboard.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
CSVboard v1.1/CSVboard.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Encopy5/encopy5.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Encopy5/encopy5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Eve/eve.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Eve/eve.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
FoldersReport/folrep.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
FoldersReport/folrep.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
FoldersReport/report.html
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FoldersReport/report.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
MICROFTP/MicroFTP.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
MICROFTP/MicroFTP.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
PDFproducer/PDFproducer.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
PDFproducer/PDFproducer.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Password Generator/pg.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Password Generator/pg.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ShackUp/ShackUp.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ShackUp/ShackUp.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Spread32/Spread32.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
Spread32/Spread32.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
TheGun/THEGUN.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
TheGun/THEGUN.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral29
Sample
Xcalday Calendar/xcalday.exe
Resource
win7-20240419-en
Behavioral task
behavioral30
Sample
Xcalday Calendar/xcalday.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Xpass/xpass.dll
Resource
win7-20240220-en
Behavioral task
behavioral32
Sample
Xpass/xpass.dll
Resource
win10v2004-20240508-en
General
-
Target
FoldersReport/report.html
-
Size
1KB
-
MD5
6214a6541b0f896bc5607e1d86490d65
-
SHA1
27f479af93e7888c3ed8616bf0fcafaf89f2dd1e
-
SHA256
669fb97be31468036ecef9a0c8051bde78a573efbe6063ba7ee52afe2e7c6e98
-
SHA512
b7f0c27be8726fec7e49c1c28378ec850ca071f0891773ef603c9d6f499dc7ee798209c881a1727edcc899c4c56259c790ed41f8be33b2ed2dea4b63ba35544b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3292 msedge.exe 3292 msedge.exe 4732 msedge.exe 4732 msedge.exe 3500 identity_helper.exe 3500 identity_helper.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 432 4732 msedge.exe 80 PID 4732 wrote to memory of 432 4732 msedge.exe 80 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 516 4732 msedge.exe 82 PID 4732 wrote to memory of 3292 4732 msedge.exe 83 PID 4732 wrote to memory of 3292 4732 msedge.exe 83 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84 PID 4732 wrote to memory of 4524 4732 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\FoldersReport\report.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b83646f8,0x7ff9b8364708,0x7ff9b83647182⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2368642252341916045,5671858667657018081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5ca27a6bd86c3e5fab3db85e8ef106481
SHA1a289c4f6d1da424c16ed94c7635d777472361887
SHA256d939760cb2b691d3d16858fb4942b4431f508eaf8b92ccf9b86648931ca4c2d2
SHA51281af9fd6fb1a35c1c274ca26258ff9bc96591d9310da52586dba8225553a25404cf75a251223821505ae6e2219ec8cf9ec20407a44415bcfc3b7ddb8c878a4f0
-
Filesize
6KB
MD540da1f72812d4073997c7f6986dd2f87
SHA109b10351b09e2b74b69ebcfdf58464d08f74af78
SHA25661dabea014ab8ef0768067fd55cdd11150e69b6a470ba794348056483f63d23a
SHA512b3ca06b21d93cf58b3be0edaf95e5d717e3c94826909f342eeb3f309f9c1efbb26162103fc586e74454be8617473a1df8c014974281b5fbbb466b47c30e2fc92
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54ac19cad95465f4c243c9bf6502174e8
SHA103845b457ef1830d1725dee0d9a3e3ab2a15ac28
SHA2569c323c819b9b7b7960c054cd430cbb2713f237e62aa54fd6105cbb3d1452fdcf
SHA512a62f1db569fd97c5ddad1f340164c7fe74d783a56bf610b524392f95eaecf482659033203d44348cc84b0a098c5e4275d1af7be13b57f718465e80a24ebdba55