Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 13:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hafla.us21.list-manage.com/track/click?u=46877d2dd211302a7946349ca&id=ca00be953d&e=3072171aa4
Resource
win10v2004-20240709-en
General
-
Target
https://hafla.us21.list-manage.com/track/click?u=46877d2dd211302a7946349ca&id=ca00be953d&e=3072171aa4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 2328 msedge.exe 2328 msedge.exe 1000 identity_helper.exe 1000 identity_helper.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4728 2328 msedge.exe 86 PID 2328 wrote to memory of 4728 2328 msedge.exe 86 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4348 2328 msedge.exe 87 PID 2328 wrote to memory of 4752 2328 msedge.exe 88 PID 2328 wrote to memory of 4752 2328 msedge.exe 88 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89 PID 2328 wrote to memory of 4892 2328 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://hafla.us21.list-manage.com/track/click?u=46877d2dd211302a7946349ca&id=ca00be953d&e=3072171aa41⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bcbe46f8,0x7ff8bcbe4708,0x7ff8bcbe47182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16932193544685824520,12580667552822608137,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD503a871140342b5168ac3e2ffc53f5fbd
SHA1ea2eaf90d33489343c54b152dd06b25069465527
SHA256d5dda08941ec6989921dabd2303494d001ad2865e49c461de639fb621215550c
SHA512966c0c0045d49742bbd9301314e512aff51c06f31782c5c25a27a5357c3df3c3315f4bb9ed8d458025f1ab0295759ce274e414e240f2e741acdec90caeb59099
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e1126d148f80c18aeefa38a968c93921
SHA11c51825c6e9db17209a8e0f86b17690683e6e8b7
SHA256e6917596f54c4c490006700045d677f745acd9316c03bf7d7c376329a972fd44
SHA51299047fc4976258eed8f6d02e2285c8ec8cec5f11a4f6aeaea5e7a07af9eedcb377bf02859fae7746d9387c36a216d326603c6abb1868fd5e248cea36cc089d73
-
Filesize
2KB
MD5b429b0a7ebba846ed9649cb400cd8fba
SHA19c4cb38ec142034ee8e247ae9bec6c973d79de4c
SHA256f334946eeeb7a8bb7f502af1447be59239d90e2d291763503be13eaa91064e42
SHA512a1fa698f757ce9ca25bbcc7d3bc2848f79281a87f8db7518ed87ffb3061252313a128a19fdc18ebb7789a7404e5280551ccaeddc5b0111189cb3bac04ec361fa
-
Filesize
5KB
MD53a9521b91c686f4943f59cd4d7bfcdb4
SHA1e397972c7a94aa765843ef288f6cc36d80e0eb27
SHA25668967118add681ae3c73a347907eee60111d494a1d3014082a38cf84cd88ebca
SHA512e64ce52ac5845ffcb09e2fe924a6a09bac33c6a9beba770369f4c39ee83c21f93782fbb59aae6e508b13720e912cf1d163992fd2701fa8aac2654ec82d855674
-
Filesize
8KB
MD563533db989d60dff4f13fb9846512c91
SHA1e1d7ec62406e9ea730f3e0db864233ed209ff345
SHA256c31bbd7be3efd20e7c9bdccd8b0d40fd829ca6fb174bb5b996056d5b33ab343f
SHA512dae80b4ecc91caf0e6cb46cbdbe863b8e262df2506f44b787e0caed692bcdaef070c6e4c5ae5edc925e67d15247b59f75e7378cd2f5cb09d09ddc7fd03b1d35b
-
Filesize
1KB
MD5f6298ee831409024fb11846707c3a66f
SHA113c4e4d5236ed9051c64accf95829337e3c116eb
SHA256679c8a4d40bf6e905f1c60d8c0f4aaab6f8c2c2e32462fe3b7b25c8763a9629a
SHA512f9ef272804b2f79fc02bc9cd01156207dedaf141729afe6c83b74664b5862b9e2ffe9cbbcf58145bb504b4fad054f64ae45b78dbcf4eb57f3421c2d30b744449
-
Filesize
1KB
MD5b6954fd9d20396ad451988e2b9d67d10
SHA1ecb39300453faefdce700188b0ff95c03f2fa339
SHA256d632aab808492c3cfdd76f4cb4052455483387020be59fe80c2dff7ca6d18486
SHA512c58675fc4f8ae005b204814d6aea9fee01840bbcfa2154a2b0f1ead21d49d4d927da26b0959d39b743d4cbdca8fda52032f95c3204607c1f65fb80135e6d6532
-
Filesize
1KB
MD595b78ead9a1a5ef97a5b9dd9ef285127
SHA145f6df11292fc3a2d9e4852ba3cecc6b3f8ac614
SHA25676bf05f696518ed7144bfe198e7e4f8a5be27e80dc66fa56b4dd5fb3ec51b268
SHA512eee2dbbaa7bc6cafa80ffe8496ae9e673e42bd786c57a7f1963e89a4f7f120bc86269c91380d25213da9f45d7f9754c0631a42e7c212ef6d37baf82931f7aa79
-
Filesize
1KB
MD5606a7d6d946dcf9775c27d716406ca69
SHA1c15db71d4f535c1740ab7138b6d8904d0f8e6e06
SHA256592c8d759bcffd88679f500c09b3666e60d65be89be37b1ba447937c3762f4fe
SHA51265c67a2080eb604c11454aa378dafee3df3ef44b97b395e6e64b60b15206974fd02b62154461d4ee21d2f114e755a0aa332ab0f8339133ea04fd44803fed78a4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bd72f280-fb60-485c-a34a-9bce6552130a.tmp
Filesize8KB
MD51bb7fcb5d60d0cb43a5d5f68293c94bc
SHA1f34eee6a5b74d307a435ad22d0b9456b32067ad3
SHA256bdfeeab0b8b53e7684ee8456bc84c415ced895006a9dabc24c522e893ff25e98
SHA51238d41a57c7fd1275d2495b30928549efa12157ab63e8674c873a9052990a09445f7f43b0c2495d908283685c374a32da14616417facb04143af9d1101f048d31
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c2b1a865649439aa7d9a00aae267f422
SHA1ac9fb7d15713f4047c3283cc6f76e3c27a5d8c00
SHA2566aed37ae67b33b7a76f551f0eea384ee657c2ab9b2403c24929f7e5e1a2229e6
SHA5121f753d6ec1cdbec9ed97bdebb9f33ba850095a8fa486ccfec29aa420ab32ef7c654d1fa41a138b0005fa60e647d082b3d04bfc57344962acad0f562fe4e8e41e