Overview
overview
9Static
static
3setup.exe
windows7-x64
4setup.exe
windows10-2004-x64
4$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$SYSDIR/frapsv64.dll
windows7-x64
1$SYSDIR/frapsv64.dll
windows10-2004-x64
1$SYSDIR/frapsvid.dll
windows7-x64
1$SYSDIR/frapsvid.dll
windows10-2004-x64
1$TEMP/beepa.bmp
windows7-x64
3$TEMP/beepa.bmp
windows10-2004-x64
7HELP/help_fps.htm
windows7-x64
1HELP/help_fps.htm
windows10-2004-x64
1HELP/help_general.htm
windows7-x64
1HELP/help_general.htm
windows10-2004-x64
1HELP/help_movies.htm
windows7-x64
1HELP/help_movies.htm
windows10-2004-x64
1HELP/help_...ts.htm
windows7-x64
1HELP/help_...ts.htm
windows10-2004-x64
1README.htm
windows7-x64
1README.htm
windows10-2004-x64
1changes.txt
windows7-x64
1changes.txt
windows10-2004-x64
1fraps.exe
windows7-x64
9fraps.exe
windows10-2004-x64
9fraps32.dll
windows7-x64
1fraps32.dll
windows10-2004-x64
1fraps64.exe
windows7-x64
1fraps64.exe
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/AdvSplash.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$SYSDIR/frapsv64.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$SYSDIR/frapsv64.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$SYSDIR/frapsvid.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$SYSDIR/frapsvid.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$TEMP/beepa.bmp
Resource
win7-20240419-en
Behavioral task
behavioral14
Sample
$TEMP/beepa.bmp
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
HELP/help_fps.htm
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
HELP/help_fps.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
HELP/help_general.htm
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
HELP/help_general.htm
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
HELP/help_movies.htm
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
HELP/help_movies.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
HELP/help_screenshots.htm
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
HELP/help_screenshots.htm
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
README.htm
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
README.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
changes.txt
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
changes.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
fraps.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
fraps.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
fraps32.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
fraps32.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
fraps64.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
fraps64.exe
Resource
win10v2004-20240426-en
General
-
Target
README.htm
-
Size
1KB
-
MD5
5d333847ea3381ede70b2e44ee020416
-
SHA1
ac04265c3e1af4222c417216282ce16a7b63c5a1
-
SHA256
68030a6f628f860115432c4ab704d8a8cd6b7a511b09c63f1c0c59e35c38a00d
-
SHA512
a0fd61dd88d9961903f53c82adaae503acce8c1ef8e8505a07b0245d629ec8eedc946961bf8ae6d9f631f2f9ef950a7cda8ab697c2102451807185d7d4c23bec
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2176 msedge.exe 2176 msedge.exe 1940 msedge.exe 1940 msedge.exe 3948 identity_helper.exe 3948 identity_helper.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3132 1940 msedge.exe 82 PID 1940 wrote to memory of 3132 1940 msedge.exe 82 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 3364 1940 msedge.exe 83 PID 1940 wrote to memory of 2176 1940 msedge.exe 84 PID 1940 wrote to memory of 2176 1940 msedge.exe 84 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85 PID 1940 wrote to memory of 4240 1940 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\README.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc030346f8,0x7ffc03034708,0x7ffc030347182⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2280,14225847404209776764,16827763743033875634,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
6KB
MD54be43189bd9de2d4949f188f6e780ef8
SHA1f645c4f8a52159a7ce90dc25ac0ade44a5cc0866
SHA256cf0f0efb9686ae8888042562af4a97dc0ad3038f0df107fa6d448b8f02cb0cf9
SHA512bba018b0d995009080feea544066364bf54db63388f849ecbf23de35b9af01d28eb04d91b98da81cb016295cc292eabeece399596dd05f7fc66780aa60dba8ee
-
Filesize
5KB
MD55e2cb1a88cdc8f5f5241476008f8a3d2
SHA1143256e5e096ca1025499e553ec7d71fe6083882
SHA256e050ab40f4fab3d28f2f120abd41c629a7032225715b9dbeeb8948cbb790e9dc
SHA5120485dcbfe0aa1a40c99587c9ed5df005bb0caa1fab60d20813321013d41ad80c97748535b6f41495269587f095298f071068a98ea8aafb43de4676e932aec569
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD52951c951d44234500767f2ebf3002d1f
SHA15da3ae55a96b2e464c727fcf2b9de2b26e2ce0d5
SHA256d6ab7173c6c30949193796434d0c342b77cb077f4b9c1faecb8d665b64d093ec
SHA512fcd513b73b08b4fb55b0d3b463e42e857c06def59f057db2ac855ba71ba8bd3cd08fe4a87ec39d21808df2057881d28f2e739530739a9ea62a0091b882df3d37