Analysis
-
max time kernel
242s -
max time network
260s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 13:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discover.aveva.com/paid-search-design-and-build/ebook-en-data-centric-approach-from-engineering-to-operations?utm_term=digital%20twin%20technology&utm_campaign=G_S_A_NA_All_Campaign_Solution_Engineering_Design%20and%20Build-DT&utm_source=adwords&utm_medium=ppc&gad_source=1&gbraid=0AAAAADrJ10C3wGl5sE7eocv6qXWhP_mPx&gclid=CjwKCAjw6c63BhAiEiwAF0EH1PbkprsmCpT5vyYPg1FZq0kFXgmPiIi6zFsd33uY9S7LSna0SbIi9hoCjMwQAvD_BwE
Resource
win10v2004-20240802-en
General
-
Target
https://discover.aveva.com/paid-search-design-and-build/ebook-en-data-centric-approach-from-engineering-to-operations?utm_term=digital%20twin%20technology&utm_campaign=G_S_A_NA_All_Campaign_Solution_Engineering_Design%20and%20Build-DT&utm_source=adwords&utm_medium=ppc&gad_source=1&gbraid=0AAAAADrJ10C3wGl5sE7eocv6qXWhP_mPx&gclid=CjwKCAjw6c63BhAiEiwAF0EH1PbkprsmCpT5vyYPg1FZq0kFXgmPiIi6zFsd33uY9S7LSna0SbIi9hoCjMwQAvD_BwE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1216 msedge.exe 1216 msedge.exe 4612 identity_helper.exe 4612 identity_helper.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 388 1216 msedge.exe 82 PID 1216 wrote to memory of 388 1216 msedge.exe 82 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1860 1216 msedge.exe 84 PID 1216 wrote to memory of 1800 1216 msedge.exe 85 PID 1216 wrote to memory of 1800 1216 msedge.exe 85 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86 PID 1216 wrote to memory of 4312 1216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discover.aveva.com/paid-search-design-and-build/ebook-en-data-centric-approach-from-engineering-to-operations?utm_term=digital%20twin%20technology&utm_campaign=G_S_A_NA_All_Campaign_Solution_Engineering_Design%20and%20Build-DT&utm_source=adwords&utm_medium=ppc&gad_source=1&gbraid=0AAAAADrJ10C3wGl5sE7eocv6qXWhP_mPx&gclid=CjwKCAjw6c63BhAiEiwAF0EH1PbkprsmCpT5vyYPg1FZq0kFXgmPiIi6zFsd33uY9S7LSna0SbIi9hoCjMwQAvD_BwE1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe15eb46f8,0x7ffe15eb4708,0x7ffe15eb47182⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:82⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,15940171479612026480,2182105782567212518,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD5676e7b39358ee31c49a3dfb7a948b311
SHA13902e881acdfed7039b75aba220adda80b234db5
SHA2564f07347a116e15ea8b338c6b42afa21c697d56e7467868ea4f1724faf458f394
SHA512947721e4aec34aad21e0fec450ec19af783a8f39fed1c884cd5bf6983223eda81552366620f8203d66ad87a32c1622fce2a68ce11bb775ed59cb73999b63d1fb
-
Filesize
2KB
MD59be01ec6d9ff5890d92b9fee144ea6ca
SHA175331a0a54251d28794375001917df4b54c8392b
SHA256013f7aa1320d5ea8e488810390f665e22633c030244037d222c0a343080cb056
SHA5120ec012957c341c9e5ca654b6045293e9098e37bd0cb1f06d4d5839298964b775938088472ef9489d2d07c33f2e648390a6a15479e2ea6098457a4f3c1ff964c0
-
Filesize
5KB
MD57ff7bd31f7fe7a061c2a955c880f7c35
SHA153058efad2e620a43a117ec3cc4dd5fb1d2c3660
SHA256ac3dfec8f01230cf85a132ca6e21434c4ee8269bcae9fdf30438f296df53a9ea
SHA5127c1ac8f8cc6efe4fb132c1488f1454d453ccfe15e171c064d1f7f5f89fad46e57fc78a8817ec15f252df60645f4c2a3ae7bb7964087f590cd81b899c9ac3d739
-
Filesize
6KB
MD579c8381b12c869832371055507978ac8
SHA1c99f5c934ec0c9b63fd32d56379e9e9356ddcb43
SHA256df89232ad34638c47f1e05185e85bc6f69c0ae22f381a44fd24d4bf9bf0dfb57
SHA512eb8b17b5b3a34c55ce772da5c33fd98128e80bf2b4e7535d5d9949c28cfccb2425cdd55b13288e1c44fdfc7089c94f2d4121bfce9db0c1935635a2f88a2b2b66
-
Filesize
7KB
MD55b1560f5c9f95737bd5c853dbab72065
SHA184673caf5902fbd918c0dbde3f311722af1cd410
SHA256c0120e9bef7983ee710422470f73ef5c1509c21c2260abd9329f042fb72431b7
SHA512796d065a277e690ff8dd867b272e6b60cea73599bd4fce1f67a4336913dd33beb74b7f46a98ad325555d05b801af18ab0bac763f85490270ab92563cbad7a7e9
-
Filesize
1KB
MD5f5e4a29b000d5ca0a2365b92853a5aaf
SHA1953003a8b3fac9ebff7f6bdeded1615fa248bf44
SHA25674f148d7dae666e23b2b53762bcf690c6eff79ac75e52796c8063bd309425bd0
SHA512c28f2d999add211a8c7dcfb7621908a7a3aa3f084ffe896d61e8c3d91eb64fe515acd7cf67bb9f82ecea1b1d52d924ac4c9f067f10782df721f43f68a9266d03
-
Filesize
1KB
MD57b00406a005b73d49ad755552c8f425c
SHA138329baa86f9a0cd9032e6230bdfe8569ab92e9d
SHA2563f502fc827dc48c39bf7b1eef22532259e14383018e42b97fe2e75e779db3414
SHA512548c82a8a76e85a503dcbde9ec150f045b26b25e6b2fcf8ecd2141c7dc754b3a4fcfab632e630d635db8340166882301788d66b6f018b1bcc849f30ecb93d4ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56963a4d05e01f6a00d694baa8987e22e
SHA1a64e046004ad559f498b9d1d0b1d0cb9858e670b
SHA256b32ed58963e70b6fab81e48b779db876837e55580a90f5cb573db42ea4375551
SHA5121ce2e9455ad72764e97129406f007729c4347b3dfc5bb5bf07e25a2fe24cf88510b7ba7f6b9c5f04aa4e5daf2f328c88f10d8de7854d9e19d031f8baa62ffcbe