Overview
overview
9Static
static
3setup.exe
windows7-x64
4setup.exe
windows10-2004-x64
4$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/frapsv64.dll
windows7-x64
1$SYSDIR/frapsv64.dll
windows10-2004-x64
1$SYSDIR/frapsvid.dll
windows7-x64
1$SYSDIR/frapsvid.dll
windows10-2004-x64
1$TEMP/beepa.bmp
windows7-x64
3$TEMP/beepa.bmp
windows10-2004-x64
7HELP/help_fps.htm
windows7-x64
1HELP/help_fps.htm
windows10-2004-x64
1HELP/help_general.htm
windows7-x64
1HELP/help_general.htm
windows10-2004-x64
1HELP/help_movies.htm
windows7-x64
1HELP/help_movies.htm
windows10-2004-x64
1HELP/help_...ts.htm
windows7-x64
1HELP/help_...ts.htm
windows10-2004-x64
1README.htm
windows7-x64
1README.htm
windows10-2004-x64
1changes.txt
windows7-x64
1changes.txt
windows10-2004-x64
1fraps.exe
windows7-x64
9fraps.exe
windows10-2004-x64
9fraps32.dll
windows7-x64
1fraps32.dll
windows10-2004-x64
1fraps64.exe
windows7-x64
1fraps64.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$SYSDIR/frapsv64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/frapsv64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$SYSDIR/frapsvid.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$SYSDIR/frapsvid.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$TEMP/beepa.bmp
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$TEMP/beepa.bmp
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
HELP/help_fps.htm
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
HELP/help_fps.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
HELP/help_general.htm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
HELP/help_general.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
HELP/help_movies.htm
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
HELP/help_movies.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
HELP/help_screenshots.htm
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
HELP/help_screenshots.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
README.htm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
README.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
changes.txt
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
changes.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
fraps.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
fraps.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
fraps32.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
fraps32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
fraps64.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
fraps64.exe
Resource
win10v2004-20240426-en
General
-
Target
HELP/help_fps.htm
-
Size
546B
-
MD5
f335e9e4e8a45c7dcfc30b5b8b61d838
-
SHA1
cbaa325097d7c203d7c875325a79de76f60e4d3e
-
SHA256
b1419a421ea79de26a910c941c72d8eef7f97f42e55c28e8f7df9d31be3a0889
-
SHA512
4f7d27ede6eb61ba7d656d44d1c442e1ac9db016f1278c67afcf6f4674ea3786d1f77f0cef1930f0f07e0db587c11ba79f652916b96b2e1995ed89f27762290b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 1508 msedge.exe 1508 msedge.exe 4116 identity_helper.exe 4116 identity_helper.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2312 1508 msedge.exe 81 PID 1508 wrote to memory of 2312 1508 msedge.exe 81 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 5048 1508 msedge.exe 82 PID 1508 wrote to memory of 4668 1508 msedge.exe 83 PID 1508 wrote to memory of 4668 1508 msedge.exe 83 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84 PID 1508 wrote to memory of 1812 1508 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\HELP\help_fps.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9d6946f8,0x7ffb9d694708,0x7ffb9d6947182⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,946478357789313388,2520671703881372075,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5d4c575e04c1bb8174669aaaba5c5ef19
SHA1ed0155f3f347e1715659508c3e1ba6bbe6f6469f
SHA2562116b7881447374b83853a091022f44d9abe1403350ab3eb7919fad361c38978
SHA512cdce235e1240a349aa124c9deb71b0c5f72d97e51530ac2742da21150b1e1d27ea3d99bd59223206e1bc409202299b34364806279af5306ab4f12ceeabb3c330
-
Filesize
6KB
MD56e828a2ec60875be68ff569a0dc13376
SHA18ce04633ac4dc0ae3dfd8568561c5d9dfb1d693d
SHA2562a757fd581b2ee9432e8e0088590c5a82399947f081d619f730151d2e2f040f1
SHA512476207dea5d2ab1a2c240fa427899ed6a939e1b560374b2711e89fb123612d3dc96b5d01a6c140ec1f78b3c97eb71c5dc435cdc830a88417ec74bd1d405a6741
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5dcf4ac12ee01adb0c28e20def4febb31
SHA12edfae1f4c159ee5721b6ce1fb05bc263789ec5f
SHA2563049e26268e5c7ce8bf32bc3e29455e326a9967caa4d9dd3931ac278505a6d33
SHA512589088d23a25e79ed04410b3d41d4690fa0820cd2153b6de371f8c478e903f951fb5b889e9f686a788514f56c4a50678afa0c8c01cf933e464f0af63b2a9f02e