Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-07-2024 08:38
Static task
static1
Behavioral task
behavioral1
Sample
Detection (pa5).exe
Resource
win11-20240709-en
General
-
Target
Detection (pa5).exe
-
Size
4.9MB
-
MD5
8a928d5b4eaa0d1f25fdde064fce2dd8
-
SHA1
0dcb10d745c6d43aadaa1ab97b7cce0c1e85f1cb
-
SHA256
64137fb074ba4603e4c3bae70e3d549f457338e10b69fd01d7d2603c20940ecd
-
SHA512
0d4936033a79655319697e5511908b1f500ef451c3bd18e862d0526efac219764b99ad1ab1dd73528a460afb18c81fa6150a531c5c3c7b1e64c3fbcc5364caa7
-
SSDEEP
49152:3EAnpzbAkVTBmqpH3qeRqV9BIxz2lZIFUy0hMZfr0X7RplBcqxO8mafeEGM:xqeWat23by0hMCrRXPHp
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Detection (pa5).exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: Detection (pa5).exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF Detection (pa5).exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF Detection (pa5).exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID Detection (pa5).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Detection (pa5).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName Detection (pa5).exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Detection (pa5).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Detection (pa5).exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID Detection (pa5).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature Detection (pa5).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Detection (pa5).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Detection (pa5).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Detection (pa5).exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\bios Detection (pa5).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor Detection (pa5).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\ Detection (pa5).exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Detection (pa5).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion Detection (pa5).exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1060 Detection (pa5).exe 1060 Detection (pa5).exe 1060 Detection (pa5).exe 1060 Detection (pa5).exe 2272 msedge.exe 2272 msedge.exe 4152 msedge.exe 4152 msedge.exe 3968 msedge.exe 3968 msedge.exe 4048 identity_helper.exe 4048 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1060 Detection (pa5).exe Token: SeCreatePagefilePrivilege 1060 Detection (pa5).exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1060 Detection (pa5).exe 1060 Detection (pa5).exe 1060 Detection (pa5).exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4956 1060 Detection (pa5).exe 86 PID 1060 wrote to memory of 4956 1060 Detection (pa5).exe 86 PID 2272 wrote to memory of 2016 2272 msedge.exe 91 PID 2272 wrote to memory of 2016 2272 msedge.exe 91 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 1936 2272 msedge.exe 92 PID 2272 wrote to memory of 4152 2272 msedge.exe 93 PID 2272 wrote to memory of 4152 2272 msedge.exe 93 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94 PID 2272 wrote to memory of 4116 2272 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Detection (pa5).exe"C:\Users\Admin\AppData\Local\Temp\Detection (pa5).exe"1⤵
- Checks BIOS information in registry
- Enumerates connected drives
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SYSTEM32\netsh.exenetsh.exe wlan show interfaces2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://docs.oracle.com/javase/8/docs1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffe4423cb8,0x7fffe4423cc8,0x7fffe4423cd82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,92748401739658507,15019639160503517110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD541ea7f8d3481dd99bcd110b20e0b523e
SHA1c2e64367768650fb137ca8bca04097635c75b3f5
SHA256bb4d777d2d2041f78b8cf87a32bd13fe4a5ac6e4178534946d46d003c603fad4
SHA512af446b3fbdede71d8fe1ced90772d07e0c1448620d623f9a3331e589825e03ebdae483c599ce63c63789336941e6b75eaf6f48f6b363ad648b7a4b736f0d6927
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD50a9b7c327589ef83525ff93d94a59788
SHA17f79e155603d153939aafdb96304279ce7a6a5f9
SHA256238ece98413c6cb60e29f304a5c8159b7a0aad0244ccc9180868994683a6727c
SHA51202ef83ecd4fd084c4b6fcd4512a9354c6ac6701b7ad15e3e18472afcaf4a2623e75e36b8c449741cb988e9b2b76e8df3daee658bc06de2a13a1784318ebd5465
-
Filesize
152B
MD54656c526f71d2c1122865ef7c6af3ff5
SHA161684265064c225f323d304931ff7764f5700ac2
SHA2567172417b8464d5c2f52edfc867f4d83e475b58fd316b1916cdde30ed5bdde80e
SHA512c3e4fc0baa216ef561a448e42378af01a50e0ebd9b5fe554c9af0ea3362b9ca2f4a1b99cfab66c18df085250dd7a5ca1b01ab256e28156d657c579f5518aa56a
-
Filesize
152B
MD5bc5eae38782879246edf98418132e890
SHA146aa7cc473f743c270ed2dc21841ddc6fc468c30
SHA256b9dd7185c7678a25210a40f5a8cac3d048f7774042d93380bbbd1abb94d810d7
SHA51273680b22df232f30faa64f485a4c2f340ba236b5918915866f84053f06532b0a722c4ee8038af3689ac04db41277c7852f7a11a0a15833ef66bcc046ee28afb7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD59ba0cc9968fafa18e559b5a593b2c1f0
SHA10cf6c1854b525e9813b52081b694d74deaa61ada
SHA256bd53dab64cfe468b769fd8b6b701de10f2716613acb8161b20c388cbd1ed579a
SHA5126c68d773f1ac5e47d037dfa80ae45d765e78f850d5905b4920c02bfbfd24eb4144234b281c29543bbd6563ba96f64b392ea83f93ad32ddb135fa10bdd15a8a11
-
Filesize
653B
MD52658718cdf961b552d9736ed86be19f2
SHA16d321203b1af2cfbf3fe44c57c97c2be02fc36c3
SHA25676b5000977cb5bca0cc777b7f73594b3f06f2c1c5f933d272dab4a154dd16223
SHA512ea751d5409f9ce4e08aa2785fce114a26dac746e73fe940ca90e9076ba93bc235981321429e399c63e8af2bef38f24ca0fecd8aa467b74a17687c566c990bf97
-
Filesize
5KB
MD55c2ac6dbfe85e2856ab65f84b1d6f0ee
SHA196eb32d3b331c53ad8987dba0c7ceb9bd2b67242
SHA256fefe4a5a1c7f144845d5c927728ccf88e5a9538c4e83fb37fbc585b7acc5ec59
SHA512c1629012e2150d2802ade8e298ae7189384753fd09eda29910a8a3a539f4364e6aab66a7d58243a3a980990ed7972e157e851b3f9913217b33147a43868cbef5
-
Filesize
6KB
MD5b7d0dd550fe0c79fd32245d5a8ea5159
SHA115c7cd77dec6bdc5f5809498457051890b063759
SHA2562f6089f12ef563633de751742e4c2183f04ed3c021ee04cee9343405be664de5
SHA5128db29d8a97d9cd364ff1c0cac463bcc279941f24d4c42986a9fffb3b9318c0d880ebdfb62608d75b175754dd9b5fefe84902b3c0e20161981f360f89bf6fb130
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD507210c0d88bb4d875eaf770a4edebb9d
SHA188b5ea32c01d0ab25d3d85494eedb002a077601d
SHA2566ab63b0db9ada94cccbedeace96de0f83a1e50ee4b08748285fa6ae74c67f310
SHA5127c887206a024bbece8e666bb77cf6c3a23b207b6a6798b9529a76e57e9d9e7a45bbace1db56538b17c77de601da9339aaf8df159a187c4c799419f61c5fe5ee9