Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
locations.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
locations.html
Resource
win10v2004-20240508-en
General
-
Target
locations.html
-
Size
115KB
-
MD5
8d5c39157a45863db8b365260591d688
-
SHA1
7d1d86c71284b908322faaede91183d4922af2f4
-
SHA256
d5aa4cf4b80d723a7f7356efba0beb7a3c21f0216e0bcbab6a855e166cb06df7
-
SHA512
c82fc808bb7f7c237cc51a35b855f4cce5139e33a4b5c43306e02063d9ccd10e9eae49ca2c31b6c8d5a85ba2d7f56cf1e5613e9292ff19fcbc663b6c21a38c92
-
SSDEEP
3072:4+E3smFki5Mi4Q9w2CSEmsYI36MEk0wiokqu:4Qawc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 1216 msedge.exe 1216 msedge.exe 1804 identity_helper.exe 1804 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2840 1216 msedge.exe 82 PID 1216 wrote to memory of 2840 1216 msedge.exe 82 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2848 1216 msedge.exe 84 PID 1216 wrote to memory of 2448 1216 msedge.exe 85 PID 1216 wrote to memory of 2448 1216 msedge.exe 85 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86 PID 1216 wrote to memory of 2560 1216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\locations.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9278146f8,0x7ff927814708,0x7ff9278147182⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1256 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1868 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1964 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15958492421208261289,10126063802841716395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5655b255598a570a21c66b36a2f9f4574
SHA16d2b52ad4ef48f47d4b381a47f56154f61c39cf5
SHA2563951aa06c53819de00b7c8a6f2b43bb901a8b9c675f1cde4ae29d0ff230f3946
SHA512b6974d4268ea9f400a2c14e7e01d71cea0648a65ae1c65b34d5ffd0c531462b0959e0067286bcb50188f8dc6ad5fe1ee2ec563b19b909f663401b4d0fb1cdbaf
-
Filesize
2KB
MD58fb1e67a9bb4da0d4759948d84e83908
SHA1e57c51b9f6431edf710907bb63b86c47f82a9764
SHA2563fdb9c88e17c2e1010a82767df6f6cd39a369964216309caf40bab84dadce535
SHA51273942d966cbbcbb4d95d5f09e3c952b43918a27e3620c3527793943cf7deb1c1217d8253d7cdb3055d2a70c9c2644c0a224933930829dd6405f615702f066d2c
-
Filesize
2KB
MD5e4c87a61bafd2c1e0162bee9b3e2e2ec
SHA137650655a1a83273df69c903dc8852cfd31adf92
SHA2565f835c6f3ae5e7aabc8ad063d463ba34b809cc2e4bfac454b5ffc239805711a1
SHA512d64ede9a7b99cfac7b8ac7e0c8482feebb040fb72d95a6bf4863a7ea613e82312f45fbc1766b13256597d0b7ec94f8315601f026f0e7d8fecc933648c234224f
-
Filesize
6KB
MD5bf3859cd1c594bd920f783aa0d8c645b
SHA172ac540b26db8cd6cf8793b8d0bf40e3d3e2e9ad
SHA256b3f37f4cb3d0783a496d5eea9373d37418814b4f991476a77d585121ba624a46
SHA5123a5dd361b9c6246130092c780f307291eaa84dd3306c3cadc08e55811ccfa81618b21aebb8fb6d61bb64af3d90ea8f3921775d7e5dc5568beb31eba7663bc891
-
Filesize
7KB
MD5550d9431eb3be1c4d827d2320885f7f3
SHA1053df7ba663dfd8f6daac5d1b3a159f9c5c56d9e
SHA256d84776555a62adeeacf114981ff1e045ff76fbb8a6ce5fd77d5b4db9f4c53073
SHA512cece862575dd8948e1bfa1a9fa355c91befa06c4bb183816c80279055c6fbea821666be0f86dd7736fbd4152e65b8a98bc3cd1b797096cd5ccf869fa39e46feb
-
Filesize
6KB
MD530da0f016e627e214bd95c380b22c38c
SHA14389a3e64a160df1c82701b5e0fc076116fc5c70
SHA256a13861e6cb41163f126fed16987d2a493c30470a68cae2bbbaa97c07b8c4f98c
SHA5127e55e836ffdaeaa5b1091c7b17f2476543d2f338c0d7e9cb42d5bb2c895f2f2f44a9047831cdbb76436f1ec378defe2042b08981a69f00844d93c9b0886e693d
-
Filesize
7KB
MD570c0227fcb05208b54c00f0a51b86464
SHA10af9c19ead3846446d5ea2863e4eec20fed3aa69
SHA256707b197ef2186dbf4ce68d7d2eedee22cc9ed7b9128883bb754a2949e4609762
SHA51234f195646e04353dc72cba132405432b628e953c5274976df36ecaae0108d64f903efddd2855f9a1c9c171c3ffb779c1ecc044b3db158fec3f2ef93df52cf1b4
-
Filesize
1KB
MD548f16375933f11403eee1ee3c29bd7f8
SHA1b9584d3d6716abcaa3ed12ff2e2cbbcfaa12e785
SHA25637e29820d15c47f6dc4ef92b85709bfdd1311611cda8034149dd12765b85b480
SHA512233fe1e155ecdfd19407a84c38d37158f2350a765fa4e1444952fc22a2c03132fbe70240f6b47661a0bda927e84909c3d9b6cbb51400ea16574aca62b003fe21
-
Filesize
1KB
MD57385cca7aa8b7a2a177528379385ddd1
SHA1872af32699b7451062919f152446ad3f52d2a21b
SHA2566d28286229c75072bd417b369d5b4c08901836ddb5d55723f73d905c87485e4e
SHA51236471a9bdf825f88404fea86b660a0584064ab0beb7c3aa7fcbc74ff15f45d5577667eff8d67e2dbb8e87b0c69fa3060c27fcb3afa19f03c67d4599e4a1ef6b8
-
Filesize
368B
MD5e189776f558e16cf455b96fd9d7df9e0
SHA1a2dfb28fc88ccad21780ce6543c44e3a051c6f21
SHA256fc5045bf48a5db400f93510e093342d6137b5430d09d58d851a367f1b9012ca7
SHA51222946ac2b3c04a540a94435ee99ae627464f457b1cc1d32515eacdec86dcae85b1c7194c690e211a5aa88ea23c985b515a41456bc08b337c366116e4b92f6fb7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD546ca3c38c47b75a84b9567d1c08f41c1
SHA11577e782e942f138566f9029c1ebf97ae9abcc9b
SHA256261dd0231ddc3830e0e3e1f0100aaddb7b10ff5e1346226aeb37b44d862df214
SHA512fdf4e6286ead2c4fd4199c1f92961e2f806c3678661a64fce4f82e82badfdaef6a070cbf7e4ce74b80abce9328939b0504e807c8e855e83677a9cd71808cf7b8
-
Filesize
11KB
MD537e82dba7dcf48eff4d369e2c0bebf0f
SHA14d73b7bd1576711d32b48cbd5cf88ac862a7a582
SHA256167818e4455ee4877ee1d06c440e4f459b3dc3e22b8e0030847c1b5d247792ad
SHA512887d1db71473de54f7c5afa0e59c24ffe8fd931bc5fefa91c482e5a7220546772ab82e1e1004fa70251beb44531c044c69de10bd72abef670412a4e16bf7d2a7