Resubmissions
21/09/2024, 23:08
240921-24va4azajf 721/09/2024, 23:08
240921-24mw1syhrh 321/09/2024, 23:05
240921-22ykqsyhjh 3Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
Artemis.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Artemis.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Artemis.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Artemis.exe
Resource
win10v2004-20240802-en
General
-
Target
Artemis.dll
-
Size
1.6MB
-
MD5
ba4c1db75b72e0ecc48183563a8a723e
-
SHA1
19c97efadaca0b03b3ae3ede77650347576610e0
-
SHA256
c8274583cf79fe6a46cfa15841d8ac0666a5cee11616bd329004f3838479be13
-
SHA512
e37d8f2ac8d6cc1c395f2fe79efd1639da42b2db7f03d15c8d039dd60516f417c98c1a2d951280b384465267861160c49ca4c5b3e4d3156eacf7acd4af796671
-
SSDEEP
24576:jTMcmYnNjKI9qqtWgNswtNmXn49My7Ipsy40G5Cnueh0lhSMXlzR96pxsKmY:jTMcmSGI9hpGuoGR7Ipsy40G5CnwXcv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1302416131-1437503476-2806442725-1000\{512EF9F9-C15B-4BCF-9F5B-2D30BEA1A9C7} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 404 msedge.exe 404 msedge.exe 2968 msedge.exe 2968 msedge.exe 2520 identity_helper.exe 2520 identity_helper.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 948 2968 msedge.exe 96 PID 2968 wrote to memory of 948 2968 msedge.exe 96 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 4100 2968 msedge.exe 97 PID 2968 wrote to memory of 404 2968 msedge.exe 98 PID 2968 wrote to memory of 404 2968 msedge.exe 98 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99 PID 2968 wrote to memory of 3000 2968 msedge.exe 99
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Artemis.dll,#11⤵PID:4488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff989a746f8,0x7ff989a74708,0x7ff989a747182⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4188 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3572 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4294361776484036247,13938278817079599539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD53dd35675c285ec334284ce37f85f070a
SHA1d54f23a4fc89887096ed3ef2446806a82b1a165e
SHA256a00ea63362992603c8a036b71438186c665c066f489e36196ac78c2f453c6a08
SHA5121742619db58e45c15e3f8bcad8af979953780d1256aed532d21db0fba937dcb96669606189f9e3cb4ce8f3dce2a4341f9ae04148e00cc4eb59e690d21852e7e6
-
Filesize
757B
MD536f35d309fd9645ee9069cd74bf28324
SHA139a7d6e8dc302a859bfd9547caedd02ceefcbd08
SHA256459ac00e70dca688ae2861b05cfebfe70b7bc8318aaaa03e11f494d2bea3c5a8
SHA512ce80b8629f8ed54549747005640dbde0b98a70f1e131f08fdb7a79305958d62b51a0831499ceda9d802140192c188c11d8b073bdd6e2bda22e92201e9af5765c
-
Filesize
5KB
MD5d019edd4d2a856ef4469397be55bac59
SHA17532845215cd3a28f90e2db94fac1e69a75aeecd
SHA256b7fca2f02ac26da223f01934ca766eb54394409b180322c5e140bc84917102b5
SHA5128be765899a2d49fce6177b5160b65f54769e33624a44d282777f193164d61ca79011dfbf9590a8827159ddc0f75501cd3edf7a0d1c84b9cd532642986f8352b7
-
Filesize
6KB
MD5ce8adb809cf8dcfe85e9cb96b0fc64ae
SHA1d724cfd304db0d8ad097a16ed74b6c161dbeb9cd
SHA256a200c818a4dd6de63606b222ca2995025be29069c7c134e972638dcf21f5f773
SHA5125a8b5f45100fb32761897393081bb7c018ec966c10219fbeffff4ef9d4f64429576cd42533d3cebce15cc73610fbded8b3c417334188bd45b621a5ce04530f57
-
Filesize
6KB
MD5dd84e116fa931ed2f0b0742a694b6056
SHA13af5afca5fc1dd9b810b8a00586443cf6c6917bc
SHA256b7fb20a59bbb6473ef9aa0cd11de591d00d49ff599a9942a6f471e2f8c444af7
SHA512fad20094c7279fb290f7f103cddbc20385469f1e66af0f34ce6391f27a22f9c3347a19a9962ca13473037a0a47ed5f619f666fbcd7b0aa505b5ba3515417554f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d458f10413c2080cc0afbebe939ab57
SHA1254c1a8bc856da934a247453343588b109fab852
SHA2563e883372bd773986a4583adb221630206d633aad8e5602eed5e6555d45d4c7c4
SHA5121de1e872b4d1a80fb2a52fd77021379f491966188452bc9035d5afe37f18620c3eea769621f81a7a5d64a39ce731819756282974e73d2c2ad00e16a3ee26ad9d