Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 15:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bazaar.abuse.ch/download/34f8309b94241f6e5b24
Resource
win10v2004-20241007-en
General
-
Target
https://bazaar.abuse.ch/download/34f8309b94241f6e5b24
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 2936 msedge.exe 2936 msedge.exe 904 identity_helper.exe 904 identity_helper.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2544 2936 msedge.exe 82 PID 2936 wrote to memory of 2544 2936 msedge.exe 82 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 1092 2936 msedge.exe 83 PID 2936 wrote to memory of 2160 2936 msedge.exe 84 PID 2936 wrote to memory of 2160 2936 msedge.exe 84 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85 PID 2936 wrote to memory of 2216 2936 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://bazaar.abuse.ch/download/34f8309b94241f6e5b241⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82b646f8,0x7ffa82b64708,0x7ffa82b647182⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17871974100311420525,14886119833382519531,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD59d7bcdf0017b40371b4a71d14c1172a2
SHA1f78e505999b5b84f9d01da3a977b446a7ab168de
SHA2567841ec84b6a6fb9637ec485eb216c97267ee3dd03087b0c3f117355db3a54260
SHA5128cb0a888f74316375b96f2b52007c4c3146d67ce0ddb90363fab63e80991d2f12cddf966c5ffd5f911406552dd295ff80086c8d9ab3f4d9e1fbeb833744e5a53
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b53df40dd7dd2b01e5f7897284c2f9b0
SHA17d5b01d18a1b5c9b3117d86afd06f84a0a616270
SHA256db35c1af7cfd37c6972bcc4ebb8189ca3e76a2ff175756621f006ca085a3faae
SHA5126f9daa7e108375d3def986aa64376edcd2240d03e558b2f360cf42bc8eb957f404661ead1323b3f306b58adada683bf2f5c1b5cacbee1f91ca9abbafb9dfd76d
-
Filesize
533B
MD567a6bb956fe5c21108229078b43fbc9e
SHA1a16b18d06d1037095a6c14eb06d86ba78a0e1e5e
SHA25675114ed310d032ca437024aaaf194391aba8f51483fa38baac2e384f2785ac6e
SHA512a3e30909cb62e7ed6860dcd037391214632010be7a0c6e047c0ed877d673306b8c7feab77a88ba60a9d6a7ebba73466df9e64b9302f2c00e07e33fd9ec33ad0e
-
Filesize
6KB
MD558dbde767b73d2ac537b7cd440cbf5cd
SHA1fcadf7365dbd16e3b5756a5e622e908b2a4ec771
SHA256cbe6d9b60d130d9992fbe5d7b96a014d1f8d03a2cd7a0d5c71a9a2bc0c6960f4
SHA5121d5acafd6817271afc33fb3732a1e9966ac534f4041ef02a69ec36430059ab66f934b720f62c23a2e1967ffc8c277969e5eed0d762bc9259b6ff76af1021e23c
-
Filesize
5KB
MD5f195fdcb08bfebe7c56abe9746676f86
SHA1c87cd3880564b887541f67579602249ef9d7a8e4
SHA2561fd818ddeb7d7451bc389fc665bbb9286038499c6873979f2526f6728cb96596
SHA512ea82729c4f79514c344ddb33d146c92484207cf877626718724d2ef7938afc42c529dededa050abad0c0dfcd90e00df65fab2532c8f999161b1e20cad2fb80e3
-
Filesize
6KB
MD58a684cf055172b8dc1289b6ea7805492
SHA1b8be4026c8e9f28da742894d9e37924e8ad0a25d
SHA256916df7745e591acb4d58499a0d0be79fc2a12ed287921ec4f3477be7de7ff6a9
SHA5120e634d0905fc4d07a63c9098d8898095ef85ce02168ba30f149286e142eb7d147ff338cbe4854dfa091fb14cf52d3f6648b736eb9b81f1b145d0a178daf0ad8f
-
Filesize
1KB
MD556a0efb9a89f936ac5a5eb31d1c82ad8
SHA16bc201e4d454f2a9d9cce12205d81c797a101eb1
SHA256507060a1736b5e19a86a037ddd107c23bb982512984e4fd148ad41fa589702a5
SHA51229b44c576fc0c898d63314f32ad18c6ea4be31a0ce145defdfb69a84a239fc2ff59a7f31f1f9084eca268a85f65b1a23d96523503f4d3db85dff53a8a7f52cc2
-
Filesize
1KB
MD5afcd7f3528c88bc57229fb2573406a10
SHA1299ad937ed2ed7114abdbc421e1fbecdfe501e59
SHA25687f85447440e7bb013fab93c64940fb62980f31b0c8845ad5334f4f2d36bba23
SHA5126d59c8f322e76d22176f4948e76d4cfc2d656f9c9a8eaea19d347536e843dd30da08615146dadc6b432047ee8e981a0dfaf22464be8e22b96ea82cf8bd693e3d
-
Filesize
1KB
MD597932c0c45e5547e1f75d0325a094da5
SHA118d665e390d76d2647e85fcac3e34cbe33508d8c
SHA25660a8f9fc85501521265782ec136bdd2bc34a44e3aa76e4e70d385508b0ea68a7
SHA5125044f74c383797207686904ef197c710b0cd060d189bf115d6bc057ea8ea5cf814deadf632ff1a78577b78b8a74655b2c88f484a3a8aabba3f1cde3402688c9a
-
Filesize
1KB
MD59981a1a587eccc6daba8dc1f77b3912f
SHA10d952a76d3bc6f5d267bc95b3887e9f13512783f
SHA256260ccdb449d0ac06c02c5a51b3aacc198c0c13e4e943a1a1b02e32315c7e0116
SHA5126f01abbaa716247d1de4a7e8b19c78de14efcd0f78dbe76fcb970e44e6929dd2f67d5530d6fd5bc8bf07493e0977535fc9f1d6ba02073de5a6d6ee026e31c12a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5025bdf97cb65121825812132820b6976
SHA1fdc61974a854172f304fc2bac2a5688b723bc0df
SHA2567288edfe5b664d3b9c973afe3ff60518058c97bb2a0268606339f46fe4b46e29
SHA5125b7b0c9acf9e6a53e7dd55a1fa6e0b279fbf7e8db6a4df43c973469680a1140ed5f78920842fe478f23fbe751b65e1cfe9be79bdbb5cade21e06bdb367c4044f