Resubmissions
10/10/2024, 15:52
241010-ta4cxayflp 310/10/2024, 15:50
241010-taaqlayern 310/10/2024, 15:41
241010-s4sb3atajc 3Analysis
-
max time kernel
203s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 15:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://dev.kgkingenieria.com/m/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9YWtoclZETT0mdWlkPVVTRVIyMzA5MjAyNFUyMzA5MjM0NA==N0123N%5bEMAIL
Resource
win10v2004-20241007-en
General
-
Target
https://dev.kgkingenieria.com/m/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9YWtoclZETT0mdWlkPVVTRVIyMzA5MjAyNFUyMzA5MjM0NA==N0123N%5bEMAIL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1480 msedge.exe 1480 msedge.exe 3188 msedge.exe 3188 msedge.exe 3536 identity_helper.exe 3536 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 1344 3188 msedge.exe 83 PID 3188 wrote to memory of 1344 3188 msedge.exe 83 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 4936 3188 msedge.exe 84 PID 3188 wrote to memory of 1480 3188 msedge.exe 85 PID 3188 wrote to memory of 1480 3188 msedge.exe 85 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86 PID 3188 wrote to memory of 4440 3188 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dev.kgkingenieria.com/m/?c3Y9bzM2NV8xX3ZvaWNlJnJhbmQ9YWtoclZETT0mdWlkPVVTRVIyMzA5MjAyNFUyMzA5MjM0NA==N0123N%5bEMAIL1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb7d46f8,0x7ffcdb7d4708,0x7ffcdb7d47182⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3066081416029728723,17011005636150223609,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\81c25852-90e8-4c73-924c-d39a6ec8deb9.tmp
Filesize9KB
MD514f6d7c4861fb04638a4bb2ff74d6e7e
SHA1ab1afbbcf2ab66805390ac2b96176434f0b70199
SHA256af4ec0dac2b51093cdd2c397d201996a3d487c2cfda9950acc6c5720c1c5f186
SHA5127130f8de79c2e7a489a467588278f4fec08f3d9f368413531ba6cc19238d5315c1ece6773dd2b41fd32bf393cb52f3e12426ea7063af8ff89d1509341b2b0222
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD550a9f78a918d416a7f35c4bd692985ee
SHA13933dec7bd85a12f1820f9d9a9cb312177ead9d1
SHA25671d25431cdbe6ac90cadc7fa08ee913cb771aa64aee365b143d56da2004ab1bd
SHA51213c88807956879ce2462188a92b2b303f505b26ecb9bf14d152f2ec105501907be2e31cd6aebb37ee024860a08e6f20ec85a4d093ad59db0011520730ca92905
-
Filesize
916B
MD53af647f891070a779e4ed5750e5dc7f1
SHA1629c03dd29d651b49cf9e1531f5b4f96ff7dbdbd
SHA25688b8dc5fba94f7fb971076b606683923225503164b2eb617c6e4ee3330b81da2
SHA512eaaaf9f12a31a5b53a5fa1f6f21f0541b3584529c913c95bf7e61ddd829a5c10bc6f9d2eb9c66e2c492bc95be091f062ff75e674526ebfd28695fac721c5c797
-
Filesize
6KB
MD57df6c5859d790b3e49bd3ba00969bae7
SHA1f0e2a8467bba78254a68de98fe05b0c6a7456aba
SHA2565deae48ae3ba426cbc05841ce8ee314d52d5638783c6e1eca960a5521cdb5112
SHA5124e24d2d0b1576bbb74340e523d44ce4a97e1fdd428c9a39508f68a3cae706bb98d586df72a10ee5ba25a8d69cb1748832fbf1f8b6570c645c3bb2f75f5eb0541
-
Filesize
9KB
MD51828de517dc36c853e5150303f411bae
SHA1a9d0dcc51cca2c3bd8c5f2af9cdf6213271b8d2a
SHA2569e0450524243de88b1c6c611443a0f63c224f40f5c0418061d8e0c269a4ae469
SHA5129b0a7199d41bf79eecccb35f225468150fe28d7529571de1d4e441a1989af5f76f64f3d5eba891a33f96cecdd1937ba3b8f1ce8fa78a1d37c236c1aa94463dc3
-
Filesize
9KB
MD51164f95fa4e3d8fe52a926db424d0d0e
SHA11f3f1e2cf7b2f3caafcc06bc8cd1b0b924d64944
SHA25662091ed1b56dd7553bcb180590f6dff759340de6d93ab73c0de704191ee08068
SHA5129c3554509856b55fa775a19e92956f3b70d2a2c898d64446f58d5691c39c94274eb71d62e8a126866bae82d4976b12f81a26c1ef83c2200d490635ef23482a9f
-
Filesize
6KB
MD58c618c279c6354081099160b07342c64
SHA12caf88d58def249f9d2c9992cbac59aee79f02e9
SHA25686d9d7a755eccf950cd433d5e0bbb5b14fffc121fb1e6288e4cc5e476ca888fc
SHA5123bc9b73795cc04963aafded6bf1d9f6639fd5ed8bca2d76bc74f3a5b801802c78c715462a5747af1c355ff7937338dc66eef0d9679d432435d2598a11496a6b9
-
Filesize
9KB
MD58a69f3ad9fe7d92b83332095f81f3fa1
SHA1b1e38402e365ce49d73689bc964994ef36796d7a
SHA256f9da90ff9ddedbdfbd61b000e8725822ae6cc76ecc5a595d6b2fb2da798cb0cf
SHA51295dca166252b6b3e8639499a33b89bb46750ba1e7ba3d54647e92c2598f4900bbd15db4f0b4117b986e53d5b3c93def3739e66e172f32448bb009c58e6df80ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD524e72a7e6105c815c80e408de60a755f
SHA1764127dc84a2514ec1b4f4d6e6a814a541bd43c6
SHA256671841218c8e0638288101e43f5588b9d2880285629e187e8d9049c63ef6a0ed
SHA51219262e00baa38e634e24dd9fe578762e445ec69b3530141d0ce3551de6732980af2c615c42bc2c96aa9898ff3f3193a4b6fb0dfd681fa378409c789d288f9694