Resubmissions
18/11/2024, 14:56
241118-sbaxbayeqe 718/11/2024, 14:55
241118-samvgszaln 718/11/2024, 14:49
241118-r7dseayhpj 718/11/2024, 14:45
241118-r42easyhkj 7Analysis
-
max time kernel
600s -
max time network
559s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2024, 14:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://t1.a.editions-legislatives.fr/r/?id=hfe20c57a%2C3602a3f1%2C7f94ba88&p1=//t1.a.editions-legislatives.fr/r/?id=hfe20c57a%2C3602a3f1%2C7f94ba88&p1=//app-androidl.com/aouth/livelogon/SGZ1Yz8xBe7vw7f41wnEFVvRV7f/cnlhbi5oYWxsQG1leWVydG9vbC5jb20=&..=c&ago=212&ao=817&aca=-11&si=-11&ci=-11&pi=-11&ad=-11&sv1=-11&advt=-11&chnl=-11&vndr=1363&sz=539&u=eTLPPreWarranty%7CConsumer&red=http://www.lampsplus.com/?sourceid=eTLPPreWarranty&cm_mmc=TRA-EM-_-LP-_-eTLPPreWarranty-_-tlogo&counterid=tlogo
Resource
win10v2004-20241007-en
General
-
Target
https://t1.a.editions-legislatives.fr/r/?id=hfe20c57a%2C3602a3f1%2C7f94ba88&p1=//t1.a.editions-legislatives.fr/r/?id=hfe20c57a%2C3602a3f1%2C7f94ba88&p1=//app-androidl.com/aouth/livelogon/SGZ1Yz8xBe7vw7f41wnEFVvRV7f/cnlhbi5oYWxsQG1leWVydG9vbC5jb20=&..=c&ago=212&ao=817&aca=-11&si=-11&ci=-11&pi=-11&ad=-11&sv1=-11&advt=-11&chnl=-11&vndr=1363&sz=539&u=eTLPPreWarranty%7CConsumer&red=http://www.lampsplus.com/?sourceid=eTLPPreWarranty&cm_mmc=TRA-EM-_-LP-_-eTLPPreWarranty-_-tlogo&counterid=tlogo
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4840 msedge.exe 4840 msedge.exe 632 identity_helper.exe 632 identity_helper.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe 4840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3840 4840 msedge.exe 83 PID 4840 wrote to memory of 3840 4840 msedge.exe 83 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 5052 4840 msedge.exe 84 PID 4840 wrote to memory of 4480 4840 msedge.exe 85 PID 4840 wrote to memory of 4480 4840 msedge.exe 85 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86 PID 4840 wrote to memory of 4556 4840 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://t1.a.editions-legislatives.fr/r/?id=hfe20c57a%2C3602a3f1%2C7f94ba88&p1=//t1.a.editions-legislatives.fr/r/?id=hfe20c57a%2C3602a3f1%2C7f94ba88&p1=//app-androidl.com/aouth/livelogon/SGZ1Yz8xBe7vw7f41wnEFVvRV7f/cnlhbi5oYWxsQG1leWVydG9vbC5jb20=&..=c&ago=212&ao=817&aca=-11&si=-11&ci=-11&pi=-11&ad=-11&sv1=-11&advt=-11&chnl=-11&vndr=1363&sz=539&u=eTLPPreWarranty%7CConsumer&red=http://www.lampsplus.com/?sourceid=eTLPPreWarranty&cm_mmc=TRA-EM-_-LP-_-eTLPPreWarranty-_-tlogo&counterid=tlogo1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5f3146f8,0x7ffc5f314708,0x7ffc5f3147182⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14682267438522797680,12371299960212953013,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD512e086dd2294baec6e5c68f2cb6ca8e3
SHA13313a01594c735df1498545a3e2f21924340f52f
SHA256f90e962551bdd6afa733dc0491984420a185203ff1d3320390f1d1071a493495
SHA5126be9ef9bf04cf5225baf6d81003b5a71eb7044be3fdf04767733b330dc7d15c08ba00cf9f934da52f027b7a30ed8703cf37cd9f03202244e0f66ca69a52133c8
-
Filesize
1KB
MD531b290bfd92ded472f4c221afc020880
SHA18430dc70f615edb80af1ba0a346f8fa0d05669d1
SHA2560d504e56742d8a6e64b7608cf459c02ea3d8b5348c5e1f7646a70260a439be44
SHA5123ec28cc81967db0fe7c3d25871ec4d9f5d1e5cfcb7145b83c21db8ad165c4b168f88dd290a63c3fd794d07b3b6ee8e15c88307d34951562313e2598fc751cc34
-
Filesize
835B
MD5d40d4f345e7e4b1febdc04a1e5b23593
SHA13bb02515221095081c635826b648ffad8414d1b7
SHA2567cf0589ae11fd93bcc55d7cd294099ea4e345b407054b3fd5ff4618860955d45
SHA5121af2774218672e2189c0f6fa49c38f7a05cbb0b6676b79427745bcc6de31c5c15195f9daae243dc9a1481d6da6fd29bd3efa4e2941d52b23eb08d7900f1bffd0
-
Filesize
5KB
MD53d2e3ea35b4707003e33efa4cac5809c
SHA1983ff7209c6dc765627499ebe69c76d846cdea48
SHA256097ef15983df22c9149e48a5914be95af2f60c6b9a0fa874a7264030736a2d9c
SHA512b5fbd1437217c22d887e54d4c5a29fb199be855ee693a0fb6cd594a7f3f9814dc3e3488e94d759bd1017e0293f8a739e9c40aae4b2564bfe8b39091f0339c5a8
-
Filesize
6KB
MD5e7789e123a883484ea620fdb797e4504
SHA139ba9ff3da2511dc141ddbf2b7544ceb6a18776a
SHA256207e710dc6bc0d659f0ca618cda19fed3b1ddf842deae42f009801e6ac3e7e43
SHA51277666d91c02e0159660bb7952362e4db4b8d0696a1ac04531a4a005b74dda12a178767feed2492e18d6808681c71d34f7b3d15755d4abbe3b5074236d4196594
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cec59a1724b2e3a10777d72a4258896c
SHA1ce81cbefa9bfd311af89857e525ecd8420611856
SHA2564be55703ba9585897512444a9654f52cad4d6c0af330c4251f3b843867b63e02
SHA5123533bdeadbd15d245ebf1793ea86c344ecf168c1080d743c30012b69ddcb63ee23ac320de2125f37d075907b9bf0dfdd8d76bd5c857ac4c41e6a02858367941e