Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/08/2024, 00:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Cotton-Buds/calculator/releases/download/v1.3.0/v1.3.3.0.zip
Resource
win11-20240802-en
General
-
Target
https://github.com/Cotton-Buds/calculator/releases/download/v1.3.0/v1.3.3.0.zip
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4112 v1.3.3.0.exe 4112 v1.3.3.0.exe 2592 v1.3.3.0.exe 2592 v1.3.3.0.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\v1.3.3.0.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 2432 msedge.exe 2432 msedge.exe 2780 identity_helper.exe 2780 identity_helper.exe 2712 msedge.exe 2712 msedge.exe 1028 msedge.exe 1028 msedge.exe 4112 v1.3.3.0.exe 4112 v1.3.3.0.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 3280 msedge.exe 2592 v1.3.3.0.exe 2592 v1.3.3.0.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1312 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1312 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4112 v1.3.3.0.exe 2592 v1.3.3.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3996 2432 msedge.exe 81 PID 2432 wrote to memory of 3996 2432 msedge.exe 81 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 3564 2432 msedge.exe 82 PID 2432 wrote to memory of 4860 2432 msedge.exe 83 PID 2432 wrote to memory of 4860 2432 msedge.exe 83 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84 PID 2432 wrote to memory of 2340 2432 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Cotton-Buds/calculator/releases/download/v1.3.0/v1.3.3.0.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8c4bb3cb8,0x7ff8c4bb3cc8,0x7ff8c4bb3cd82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,12508171246109238912,12966742481715568984,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2680
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2664
-
C:\Users\Admin\Downloads\v1.3.3.0\v1.3.3.0.exe"C:\Users\Admin\Downloads\v1.3.3.0\v1.3.3.0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4112
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
C:\Users\Admin\Downloads\v1.3.3.0\v1.3.3.0.exe"C:\Users\Admin\Downloads\v1.3.3.0\v1.3.3.0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8276eab0f8f0c0bb325b5b8c329f64f
SHA18ce681e4056936ca8ccd6f487e7cd7cccbae538b
SHA256847f60e288d327496b72dbe1e7aa1470a99bf27c0a07548b6a386a6188cd72da
SHA51242f91bf90e92220d0731fa4279cc5773d5e9057a9587f311bee0b3f7f266ddceca367bd0ee7f1438c3606598553a2372316258c05e506315e4e11760c8f13918
-
Filesize
152B
MD5058032c530b52781582253cb245aa731
SHA17ca26280e1bfefe40e53e64345a0d795b5303fab
SHA2561c3a7192c514ef0d2a8cf9115cfb44137ca98ec6daa4f68595e2be695c7ed67e
SHA51277fa3cdcd53255e7213bb99980049e11d6a2160f8130c84bd16b35ba9e821a4e51716371526ec799a5b4927234af99e0958283d78c0799777ab4dfda031f874f
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
5KB
MD55fb5469811e9340932520ef3225b4c1c
SHA1654260bd89faf3a878ab4007f59ae85b72e29260
SHA25626bcf143a842eb7ef2e27430ab1b3f0bdc819759dc3844523f25b195c7590432
SHA51253c76ad7ecee711a9856ee3e0a8122e8286cd4acc10adef88fe6badfdf2641db658a9cc64c7132e1d45b4991583b9d1f42f6bd7961abd5de1a61fb9e731f2125
-
Filesize
5KB
MD59a2e56e564e01ad6716599ee7ff50bbc
SHA1c8d11d944d44f9ec8e23bd2e043619210dff5e84
SHA256693c8795e8b306b40f53b0c26a8ccd9e79b3b1303ca2e3508c20d4992e04a49c
SHA5123a75809e8ce534e012cbbd24a419f9e43a4962bec8d4aaa6051c17f8c7dbe9da4eb60211d97a616d73a729d5ed4916b0f0ac35c01edab3d94a0e95d32c59a6d5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD50b4e2f454fa3e31a31d370c3cbb873e2
SHA13c3b1df2c1a1bd0f0c43ccb24fabb44b16029d44
SHA256e0c0e16cf66fb04db7ba6d20e68b88d89ce2b1f6301747d90402a50f9e5f9624
SHA5121ba671689aa66c748c0402c72763d36880ba40a03553a5f828828a17e69f9c0d7656dc538346de889f7fb5e61b7b20895528f4b54371f5960f93e8d0e64079a5
-
Filesize
11KB
MD5e55be6fd9f45b1df1563bbb2c8a2f695
SHA1ebf89ab0e6cc227c6e8596fdf360c7e15613e48a
SHA2566c26258c21c5ecebddbc35a1e1a93d4bcfe17dea53ec8d6da998f71461e52b01
SHA512ee25bda5638fb84ef2b50238b9847b4205edaef68a9ba67b5f8d902ca616113a20c8f1aceb9934da4970c755af86531f460ffb610df54ed4ff3775ce1d18c5ed
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
32B
MD50579ccdd65f9c8153069600ad967a042
SHA12020ef00239f525f57c6fd2bec3700a2f2804b48
SHA256b4eae9cedd9123a8dbb34544e8679a728d1965649e626b212253bcace9f54623
SHA512d0d55965a5c9cde754dd87489cf08d807a1a40c4748862e2755bd008e566c59e78a9c963ca4355e4f770b9d2892a54396db0dc089577580075197b3e5b1791aa