Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-10-2024 23:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://staemcomunnutty.com/gift/activation=Dor5Fhnm3w
Resource
win10ltsc2021-20241023-en
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 2588 msedge.exe 2588 msedge.exe 4144 msedge.exe 4144 msedge.exe 1480 identity_helper.exe 1480 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4144 wrote to memory of 4520 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 4520 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2632 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2588 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 2588 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe PID 4144 wrote to memory of 3032 4144 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://staemcomunnutty.com/gift/activation=Dor5Fhnm3w1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffefa833cb8,0x7ffefa833cc8,0x7ffefa833cd82⤵PID:4520
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:3032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:3732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3984
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4408
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6111623587725708819,5964199780631558851,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4676 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD508983e943fb567ea62cb1172d3812bd4
SHA1ee1863828c99f6856fb02e1f55bad88c2f4e965f
SHA2564e6686bae79bd332ad922aa07b49db5af3c5f0decb593217cda19057ecbef631
SHA5121049a142f664106fc603e0a7668bf98a654aeef69e19feadb9141761fe540e408d42a3b41e1e2e48eac4bcdd7969dd0bd8d9ae9accc06a92f0410de7b6f760d1
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2f272305-6320-439d-becd-a9e018259e87.tmp
Filesize6KB
MD50d0ba61caec502701527068b09c6245b
SHA1b582975e476f02c24aaa91cf4ee06082c0dc7eac
SHA25650c98959c21d8baebb21bd9551485999ae5da6227d10097c5080cb54174f63e9
SHA512c18a06a0f2000fe4fb5bc0320efe866817347d5a8f43368d73ce472df2ac02387700ba2fdf905083f2387ff42e62a276c88475eb908d0f4c63f9fdf5a921ea91
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD591a1b615def6bb49d2b89ed3b970c2aa
SHA1deb16ebf8e90ebedab203cebb56f4b370473698c
SHA256ad98b6dfdfb931acb1f88893b77e7efd0661845a23659a08dfc465fb2d161165
SHA5124d958680cebb39132f28624b6210e08acd9a0f195f4e300e659cc846e68bb63d972bd4a751afe6052e22d78edd8580d22ee0731cb3d88c840ea0cbbc11524798
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD59722d408c677b62d2a3b09700906071e
SHA17bff443cd6e6d2e130dfffaa83daf578dcd8968d
SHA256d9fc359754b4672c1a74d486ca416f4320b2e0c168e855fc94cdcc1bf69b0067
SHA512f8af4b971484709621aab9dc711c24779edf7f38c99e2260524b128b6bf7cf48e8d1f9b01a3dc673aa477eb3b870a22c39ad6262caf41b09596c46d316c492dc
-
Filesize
784B
MD5fcc9af6d8aaea29bfa89cfb27f682b61
SHA135530eb00b9610e0f9c6607aeb4f056d7d71f7cc
SHA256ed2d6751b2cfecd4c7dfeb09a7dc53ddc14577457c2dc29c96208d3781e2c476
SHA512331a88b0ed05ae87ce9aa108c19448901121fe6c4af3420f67a36bb5c0753e2d0ea901123a953e806a701be395c604ccb625223cd129644e8abde556647a52d7
-
Filesize
5KB
MD516fdfed38e96bdebfdefacd9ad1738c1
SHA136e49573ee346baeb6b95d3273434bb7ed5a0500
SHA256ba0e0c3bda3fbe97aedab2bafea752a2e62ed0a9981cd223c8d300e468edb0b3
SHA512321d3d4749c0f74b55f439426dbe84490c4e0e24c97e334f9f3e7292fdadab956bf5e573f6efbb249bab0c56a5e102b3ef662cc965553e6c1e9266e337e8a9a8
-
Filesize
6KB
MD51bdc130f5762f1c919b6fb9c10f28a09
SHA1fc6eadb6adf8b5c9fc2ff31d533117f4f0500da0
SHA256b3f19d3862324b8c3b7be51dab945219c01795b0b4aaae4ae1dd372e7ad9bf05
SHA5123a11b992ea5a415c852ed92d93b5e1c4fedd44bae58d7e8d7c07f1bc2e104d41d3d543ec2b8d4021b63a5466fa3c37e445ceb665632d7c01652f18d31f554c5e
-
Filesize
874B
MD59a09d9fcce2d6df98a8cc44553a46694
SHA1d1ed9709ae2ab991f3e53d48bac3c47fe46e8ebb
SHA256e72bfe78a72f1b66ad3b29612aa2427e188e3994991b6e02b48d208063cc6b5b
SHA512412f4d67cbb5750e14f8126f2edb6e73c25791a97b205f6f5768943c199f5b6742e10d8224b7f78e743d41119a0812af45d620f5dc754e8d325c2073a32d9d53
-
Filesize
707B
MD501f20d841325ded74c5096cab8bf1d22
SHA1a1599834c2bcac42870a4484f7404632bba58a39
SHA256dec9e7f70bed5852ca1c357ff2bda7126c0e2b8e13a1c0388e55acfed3cb3f82
SHA5129f297fd6dbedd24482172834cdc6645848f98afd87d7150c30d8fd794bb5098d984d5028dee72eb91c404ebe65bfb4cc1bf7f158faf631a9bc7f97e7563dcc12
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5cd709276320d6e7032c266dbed25f3c9
SHA1878696a5a1f6661788b8d6db829a12b24fe3ae17
SHA2565f05f325a267eb5eec4bcf95fb480f7ed9c1372c31972d71a46bb6c9472529a3
SHA51294d3f14b5872560f3de73aa19f6c12b5a3450055507378f2daefd9c9e2a0b17f2f125852a902f889dcf5a28c85057f115c639a4076a2af4e3d353ec2744e9220
-
Filesize
11KB
MD53d064a76e20defb6a72dae16bbcbec70
SHA18c7ec5229dc6824d9af753c5fe750fb74c4e0fca
SHA25633d11e1045f2854f687c6131bb652d0469fd475effb0ff463d7a6961e6653227
SHA512d4ab09fc6373f18f53e8605e19efe48f6f85fc19f3c8f1061c55a480d12bbb381f90f0ed18131870515af868f414fb9b19b1e098203f3c726f37d365102e448e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e