Analysis
-
max time kernel
149s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 10:40
Static task
static1
Behavioral task
behavioral1
Sample
ActiveSync.exe/ActiveSync.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Autoit3.exe/Autoit3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
SafeService.dll/SafeService.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
script.a3x/script.a3x
Resource
win10v2004-20241007-en
General
-
Target
ActiveSync.exe/ActiveSync.exe
-
Size
3.7MB
-
MD5
d9ab5ec0952f1927aa013a9fb92d154e
-
SHA1
0f956f83b3db92b8017ef9450bf97c2bb0c170ab
-
SHA256
5f73318a2f599782b3f74cac4b200d0bd19ca7083551643db6972704992e8005
-
SHA512
be22fe9f0e6f121214720b6c4b6ac86b6edc3d8b75a65b9c0cb82ccd18c6baa6dde05b8d6b6b39046ebe2ef20c254a0a05d624c700c877d4221b381be6281dcc
-
SSDEEP
49152:k1JkqNY5gjjwtvJ6D4qYjE2DfOzcOzxAfEQjCsnrBU54+ZKlBtvtMt0+Jf1Gzyyi:k1JkqNYWjk6M3DfOzcOpcCsrBU54+mL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActiveSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActiveSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActiveSync.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Autoit3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActiveSync.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1 Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14 Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0 Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Autoit3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Autoit3.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\Shell\SniffedFolderType = "Generic" Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Autoit3.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Autoit3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Autoit3.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Autoit3.exe Set value (int) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Autoit3.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Autoit3.exe Set value (data) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202020202020202 Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\14\ComDlg Autoit3.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Autoit3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3664 msedge.exe 3664 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe 2616 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3868 Autoit3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2756 2616 msedge.exe 96 PID 2616 wrote to memory of 2756 2616 msedge.exe 96 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 976 2616 msedge.exe 97 PID 2616 wrote to memory of 3664 2616 msedge.exe 98 PID 2616 wrote to memory of 3664 2616 msedge.exe 98 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99 PID 2616 wrote to memory of 2548 2616 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\ActiveSync.exe\ActiveSync.exe"C:\Users\Admin\AppData\Local\Temp\ActiveSync.exe\ActiveSync.exe"1⤵
- System Location Discovery: System Language Discovery
PID:456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://~/appdata1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ff9592846f8,0x7ff959284708,0x7ff9592847182⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11294661049903422928,6455090239340969694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,11294661049903422928,6455090239340969694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,11294661049903422928,6455090239340969694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11294661049903422928,6455090239340969694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11294661049903422928,6455090239340969694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\ActiveSync.exe\ActiveSync.exe"C:\Users\Admin\AppData\Local\Temp\ActiveSync.exe\ActiveSync.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2752
-
C:\Users\Admin\ActiveSync.exe"C:\Users\Admin\ActiveSync.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4812
-
C:\Temp\test\Autoit3.exe"C:\Temp\test\Autoit3.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3868
-
C:\Users\Admin\ActiveSync.exe"C:\Users\Admin\ActiveSync.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
5KB
MD59477d4b381af90ea636d9e6cdc5e9ea5
SHA1f7dcd0ed1cf513980c3b68bfe77692c73af55248
SHA25663f1f54d06a88a16815cd9969366bbd42270923bcea97e592c8082d41a27cc33
SHA5122963e0dbaaaa86769d469a0522bc5cc01986fefa53beca7197e4a5d8b3f32fa872031e81e248f28206038989d5348159e69da6f26f37ccfe2b11d5da3c26087b
-
Filesize
6KB
MD574b226ee684be2c6622f27bb07080737
SHA15b685d1f75b42749ea663aeab9676142aa917682
SHA25631bf955462a82f8fa89f7f385669b649abf74cd65dedcf9134085ebb069697b7
SHA512ca722d2130f3ea75d0863c946dd12a6753ab3f0f3b71a0dadabbd2ef454f4ab5fe50bf269baadf661715bf8d215a032660de2c9a7a207c2bd61ece077a074afb
-
Filesize
10KB
MD5791bd90ff0c09339d3433e04a3a9020c
SHA13965adeea10ecde4d038f0ece1ada84cee134980
SHA2566844a6690f0df7182818afa29c8968bb9473ebce2b64aa20bf491bf4eb39e072
SHA51298eea9b97456a951a84310b12842b221e5718a6ff05877165767cdd5180f60bfea28951b9f6f47649a1c8547a14c42fe379ce98950811154fc88e0fc96aa1dc3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58