Resubmissions
29-01-2024 16:10
240129-tmdb9adff8 1Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 16:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001mOCjdDWcjhyAkauVij1lKrIuZH3qb5TKPq3R6vLWuQ6sonq_nnTg2lQUhJpxWTIoxQ5uFTE5AoIi9VJ5lXE9ou73LBUQnni-RPq5C_5s9_Nf9MuRtFnT6MrgkMN0Fxc5zOjvo-BAfWQPCThTf9ycuQ==&c=&ch==&__=/62f8/VTXZ7PV3JY5LTSZKJBKS8
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001mOCjdDWcjhyAkauVij1lKrIuZH3qb5TKPq3R6vLWuQ6sonq_nnTg2lQUhJpxWTIoxQ5uFTE5AoIi9VJ5lXE9ou73LBUQnni-RPq5C_5s9_Nf9MuRtFnT6MrgkMN0Fxc5zOjvo-BAfWQPCThTf9ycuQ==&c=&ch==&__=/62f8/VTXZ7PV3JY5LTSZKJBKS8
Resource
win10v2004-20231222-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001mOCjdDWcjhyAkauVij1lKrIuZH3qb5TKPq3R6vLWuQ6sonq_nnTg2lQUhJpxWTIoxQ5uFTE5AoIi9VJ5lXE9ou73LBUQnni-RPq5C_5s9_Nf9MuRtFnT6MrgkMN0Fxc5zOjvo-BAfWQPCThTf9ycuQ==&c=&ch==&__=/62f8/VTXZ7PV3JY5LTSZKJBKS8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 220 msedge.exe 220 msedge.exe 2652 identity_helper.exe 2652 identity_helper.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 1380 220 msedge.exe 30 PID 220 wrote to memory of 1380 220 msedge.exe 30 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 3184 220 msedge.exe 89 PID 220 wrote to memory of 2852 220 msedge.exe 87 PID 220 wrote to memory of 2852 220 msedge.exe 87 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88 PID 220 wrote to memory of 2532 220 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://r20.rs6.net/tn.jsp?f=001mOCjdDWcjhyAkauVij1lKrIuZH3qb5TKPq3R6vLWuQ6sonq_nnTg2lQUhJpxWTIoxQ5uFTE5AoIi9VJ5lXE9ou73LBUQnni-RPq5C_5s9_Nf9MuRtFnT6MrgkMN0Fxc5zOjvo-BAfWQPCThTf9ycuQ==&c=&ch==&__=/62f8/VTXZ7PV3JY5LTSZKJBKS81⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbda1f46f8,0x7ffbda1f4708,0x7ffbda1f47182⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8359817269194760861,15047198786180142,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5a6b9062fa1ae8f12bed45a5157489d45
SHA110210df56e522dbcdcef147e8409a4e54eb1fdcc
SHA256eceac0d6f884241cbfdcc34e76539071683644a586292f023be5641d8c147c52
SHA5121a93383a65ea26d0c333e82dcd9959a4131d9912c51b1587a2c793e7fd5317a65f8343b699803ef0853a209ae15e0b109d6b6de707747c400df7a1f8dc7ed956
-
Filesize
640B
MD53cd6e2b6daa7cd400495abd3b3c3f787
SHA1bd0aadcdca3bf9b960ab88ba5670efaa3d64567a
SHA256fa2e31213af5f260d27a74539722540c526217d0a7c5154b4b51250519f30ce1
SHA51244bfc9812e4cff1f9694631ac58d6b1a78359c5153730c6cc32a65126b31892744a2bf9748e3cc67783ed2bc53b48b42d6e28f01fa75c7add52143d4287a7a14
-
Filesize
5KB
MD565d6b38d228b9ce448af342607757f4e
SHA15d98e0ae8fc49084fd6e15d3495ed7ff4a44654a
SHA256a8b83e0a31432439416a6cc020126dfd94228b247bbe16596a3be89993f2b1c0
SHA51291523d5fe5b00417fce4d7534d33a972975ff33c06447f3e2719f282ed4e4ff7f7d841454660dbd764fc1180520732097e1789a4eabc8984f7f6c69042865d88
-
Filesize
5KB
MD5e34678754bb900254e84b7847a65e33d
SHA12c4188333174efe5d80f406a87a34c59c5a8af6d
SHA256d697b136f848c07bbfb0801018b66ab1e60f11cc23c4cf2e0fdeb7006abe39d8
SHA51290b849507a9e06119df536716238ca2df9109796b4fe3415935f0e004bc5c6e24fe567561f9a5cf5813bd8825930446c2d4561dbb6acf1d3fa88ac2e82aacb68
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc8fb4ed1406ca47549be72b07b60360
SHA1ca2c37e98a76034af547537931a333adb9d15d64
SHA2567fd89e4c416822bf5c04cc6f3459d94fa93028bfd205675af59b602f6dc752cf
SHA51283aa9c2df02adfffb2c04bb09647accac1c050b7452ce1e88cbb94336889c7ef4add85992b1651bed08cdd2686ae4d9bf17baa6b4ad1cef561fddeea3080282b