Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows11-21h2_x64 -
resource
win11-20241007-de -
resource tags
arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows -
submitted
06-02-2025 19:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1vg_453DQTZCLnpaYiTb6ra3D_dEcDTuG/view?usp=sharing
Resource
win11-20241007-de
General
-
Target
https://drive.google.com/file/d/1vg_453DQTZCLnpaYiTb6ra3D_dEcDTuG/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Krnl Plus.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1340 msedge.exe 1340 msedge.exe 4456 msedge.exe 4456 msedge.exe 3260 msedge.exe 3260 msedge.exe 3760 identity_helper.exe 3760 identity_helper.exe 1212 msedge.exe 1212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 3328 4456 msedge.exe 77 PID 4456 wrote to memory of 3328 4456 msedge.exe 77 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 4376 4456 msedge.exe 78 PID 4456 wrote to memory of 1340 4456 msedge.exe 79 PID 4456 wrote to memory of 1340 4456 msedge.exe 79 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80 PID 4456 wrote to memory of 2356 4456 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1vg_453DQTZCLnpaYiTb6ra3D_dEcDTuG/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe8be13cb8,0x7ffe8be13cc8,0x7ffe8be13cd82⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,4328639523471087474,12910136657388448802,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d68c7edc2a288ee58e6629398bb9f7c
SHA16c1909dea9321c55cae38b8f16bd9d67822e2e51
SHA256dfd733ed3cf4fb59f2041f82fdf676973783ffa75b9acca095609c7d4f73587b
SHA5120eda66a07ec4cdb46b0f27d6c8cc157415d803af610b7430adac19547e121f380b9c6a2840f90fe49eaea9b48fa16079d93833c2bcf4b85e3c401d90d464ad2f
-
Filesize
152B
MD5c03d23a8155753f5a936bd7195e475bc
SHA1cdf47f410a3ec000e84be83a3216b54331679d63
SHA2566f5f7996d9b0e131dc2fec84859b7a8597c11a67dd41bdb5a5ef21a46e1ae0ca
SHA5126ea9a631b454d7e795ec6161e08dbe388699012dbbc9c8cfdf73175a0ecd51204d45cf28a6f1706c8d5f1780666d95e46e4bc27752da9a9d289304f1d97c2f41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5f58bbf5671072cb648a79deaa8dbfd29
SHA174118db99c62e56ad8ff4906e3171c8c486bf1f8
SHA256e599434d0ef1ea77112862dc46b7389983f360f9613a330ce585b373167ee276
SHA512a04c76c05ad76388ee5fa7f4f93a0632dec0f8008d19d0630617f53d0400f699cf8bf2739b324edd89bb35e5a2ac51a8fbf0ca52299140190ba8071e401394f6
-
Filesize
3KB
MD5f2cf62f2f1ad5746a1dfb573832eaacf
SHA1b1d368ca4cfd6b919e2b42587e5ecf938f059942
SHA256e658c67934ea58740bd196cc85b644cbeda44c4509f4e9779640bb3e0eb2d2fc
SHA512d1d72082fadc80124822a41aac5189ae754a88900f2a5706bc365f09689ac1c277b750dc2da1dc8af7a41a70064b2231981ceac6261bb4ad7979fd9bcb83cb69
-
Filesize
5KB
MD51ced6506ff29a8249b8899a20152d660
SHA1f7d25f7e9e5a9328f689610e83dee16f48f1eff8
SHA2564919df3e9f98b42790b5ab882d79703ec9033eeecc30d05abcf3e9f0d1177914
SHA5128baae3c19ed62b0733bd01e5863b5050d9b1a735a07c8fd742be8ff981e7f1c96837599cc405c748dd02f21ad9e44516ba3044859b87bf32f019f047d20dd2e8
-
Filesize
6KB
MD5d7bee0613f2bbf48be86372dee7b992b
SHA1d66469c43647980ef9431006aa73878ea37ad647
SHA256b17e994e9d5ac415c3114e2c6487fdd42fa05ba4f33a97f1712c268418779cce
SHA512d9caa6e8f1361708b6474778ac0ea85e66713be331bd05b022f5452264750c93d84a15e9db8cf817045b554f4b328f880bb6b0629aefdcc654ea7601c1510413
-
Filesize
6KB
MD54544ab3888140fc32a215a9ee02e0b83
SHA19c1ae1e2bee12db533fa13cc1e5e6f27542a6db6
SHA256217ac7ecbee46582a9573ea477d694dd66a618342a97c0865b0b92ef66a2455e
SHA512997b904f219279edb5a561f98747319796c88b70751207fa14437840781f20850275ee56ab3bbd8229ef2adeceb93ad144d35e16c6bec34049d1abad04eb8e06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD502a931ae64003a6dc82df4573feedc61
SHA19041a1474cad0e7cad1ad262cc7490097ee35b68
SHA256f4c14fc3e66afe54f6b7b770de6da046f7dd052ff1fd2aab08c7849929941869
SHA512b08acf9a36908448c192aa42bfe532fb02009696bbc1429953921e1ca61632840b9393df8b96c5dd8c3b47423c55833bc0bacd6df0d0ff13568a3c7b799dea36
-
Filesize
10KB
MD558f4be4bea471eb908af3fa1e648fb36
SHA1c9eca602527ca48c74b76dbf6c14afda50604336
SHA2565fe6f109afddfb110c0ddee05d15967a07fcae0e94d7f1f87866dd5670432c6a
SHA512dd0d7f6bc0a146088f79f3b46c367cb519a6f02865078aba82848bc7ac7d823d3351e4cbc69d0d0af7ddfc927e8a21b2fded183722764238a96fdbb2e9889520
-
Filesize
10KB
MD5e9c1ead72caa079db7443b52fc033de1
SHA1bffff56e8138316cf2f5729533a6f84f1875e398
SHA256f3dcc48cda1385c51fe37753e568ffe4292591ceab18644d3ba8a9271052e726
SHA512ea66e25c91894ba70a787118d5055bcc52f79afe4de90cceb40aa31eb3320e5d7801530cf04ba2e72908cc6af90cd052e0b9c8278c36f5abe1109d18fc8b302e
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98