Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2023 19:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://info.databricks.com/dc/NZ1SFXSiqgATs5RfFqbpS4jd55YU9zcfAS50zwkmetiykawTGinS6OLudUanIyUKkfouon2yFZQ0ditiwc0Fof-_vih9575sugObJlhOnKhsvuZRhqM1rf5d4Rs65snPMAHwoAzedlkC36g9Ff5J41RP2G2CdTQ7JATbefjLsEM=/MDk0LVlNUy02MjkAAAGLv8Mftg5NLAQFrDi64wKUS4-6rR6VrPufRpiXX_Gdi2tjAPPcA_fJD-AUq9z_r43cZHki6do=
Resource
win10v2004-20230220-en
General
-
Target
https://info.databricks.com/dc/NZ1SFXSiqgATs5RfFqbpS4jd55YU9zcfAS50zwkmetiykawTGinS6OLudUanIyUKkfouon2yFZQ0ditiwc0Fof-_vih9575sugObJlhOnKhsvuZRhqM1rf5d4Rs65snPMAHwoAzedlkC36g9Ff5J41RP2G2CdTQ7JATbefjLsEM=/MDk0LVlNUy02MjkAAAGLv8Mftg5NLAQFrDi64wKUS4-6rR6VrPufRpiXX_Gdi2tjAPPcA_fJD-AUq9z_r43cZHki6do=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133286593946667170" chrome.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4312 chrome.exe 4312 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4844 4616 chrome.exe 83 PID 4616 wrote to memory of 4844 4616 chrome.exe 83 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 2384 4616 chrome.exe 84 PID 4616 wrote to memory of 3924 4616 chrome.exe 85 PID 4616 wrote to memory of 3924 4616 chrome.exe 85 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86 PID 4616 wrote to memory of 1492 4616 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://info.databricks.com/dc/NZ1SFXSiqgATs5RfFqbpS4jd55YU9zcfAS50zwkmetiykawTGinS6OLudUanIyUKkfouon2yFZQ0ditiwc0Fof-_vih9575sugObJlhOnKhsvuZRhqM1rf5d4Rs65snPMAHwoAzedlkC36g9Ff5J41RP2G2CdTQ7JATbefjLsEM=/MDk0LVlNUy02MjkAAAGLv8Mftg5NLAQFrDi64wKUS4-6rR6VrPufRpiXX_Gdi2tjAPPcA_fJD-AUq9z_r43cZHki6do=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff89b539758,0x7ff89b539768,0x7ff89b5397782⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:22⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:82⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2244 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3156 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:12⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3180 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4768 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:12⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5480 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3864 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:82⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 --field-trial-handle=1816,i,11777278921045555341,1282250650509030481,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5281e2f884e43776116e65db5f521dbea
SHA1baa27f2b5af34eb2797540dbb152e420b14a915f
SHA2562725de1a59c0b088644ebb51d703990214603a3f4676436c064ce0cb57f4d742
SHA512d208afe91e9c5355f2e0cdd03bb37bfad22b695beed199e5054c75a49166383c27d1fb301cc007d6f0300debb563c7283d97b7b85dfd107da1e472e6935856a6
-
Filesize
912B
MD58abd574465e8a9250f3308bff13a3b84
SHA1613cc31940b2473a2d798ec24b83381e951ceae0
SHA256f8ce9f3c248173a1f55555ff0b41616f17e546804a459f37c81bfe6d564c031e
SHA512153e764b64d7ed3dcce72e84908cc0ea47047edf87a0783b1c704acd1b15babc697e50d52b66c391e5ae6a6fcfdcdeefec7dd9c19849eb6c9e36844aed5617b8
-
Filesize
6KB
MD58151525b5aeb9a0b7cb2517e7fcb0d8c
SHA17a2576362b71cd1398e65c4145fc0635ac922e29
SHA256fa2d4d2b5ae4a8a5887effa2d2982e923022a785116be76905c9c6edd7b30e3c
SHA5120ddb621c11f20892e7d14a1b21ff1de565cf8f08e179ebaccd53e09cefe8179b2a88f76557afa39e61791fbe81b60fa398805972dd7a8c9e7aec3bd4d763816c
-
Filesize
6KB
MD58460bea9a8c56f011a50fc6df8631659
SHA147bfe8e347359901089eaf1870a93f3666a88485
SHA2568ec9ac2ad7efae7ba9112ae705316ca26c9dc29fba1bb68a4f59171135c5c17a
SHA5120b5d8e30f1c257b95e74c9dc4c96ee2655850a0124407ee41e3532d4a022f48c6341b7c94f5448ea26786a6218e52b162d103632cc8396db23bc67800bd4a272
-
Filesize
3KB
MD5b9f7cd685db882b858bd72f8bdfd32ac
SHA173a428d9dbca4d23ec612ef1ec499e43afa4b221
SHA2562618629a8acc1b2c766df4dc615904ced9e1c1a1c5a6de289904e71d59816401
SHA5126ed6b14c21a0d1fb4278f0db58d501a8bead8607df66eb39509c932c5b993bcadf54ed197d84eba0189c892ed348fe0132a7a187fc2e5939194bcb7fe3c1d7d9
-
Filesize
4KB
MD58bf7558d814684afd9facf9d700badcf
SHA1b7210c37355bf489039e07d49a81975e89b392aa
SHA256475cf3f05287053fda41069c6e7646088d69867d0b41c74243e3e77fe4060528
SHA512f4c7f0aba8aa2258023d74145c27053ea3b7a3e0105dde67d0615efe84a65899b631557caa70862ba7db66d880e3eec29074ef811b1684d214aa7f37e91c7f92
-
Filesize
4KB
MD5007b4a58bcbd899b0340ecb5eb8cdde7
SHA12e8c864fcc40200247e16969f007db74554348a2
SHA256d737b697fb6b819f088e882f8ff0b009f0fb857337c1803ecbb71d44a6179186
SHA5129b375d1c021e32774f3b22a726f2752513b6f19744a1fe0f9c06804e63c5634478d9ff31046a6e035c92224bb9f9542e378e07893ed14e800a247c487c78914f
-
Filesize
5KB
MD5813dec31583a260f885416948beea61a
SHA1a4b0be29ab77ed4eb5fb4a5dfcade98108abe5fa
SHA2560d2be08d6f5b523340d3104451632e198fd82402f9fa3fec01e7ad0cf321a128
SHA5123bafd0ed7e4d3d46f1ea3a57a81c25ca27021aef8dabfe48d951a9807f421f0677eff601435b7c5f682d808883bf9b5b6c10bdd96bd806464202fe8bb4ab8579
-
Filesize
150KB
MD5131cd714adef1288817d2a4ac357d4f5
SHA15e43c1831a43161baacc3f420c35617981495558
SHA25650560d089eae8539925df177d21c42e29115c74efb53eb983a5bab0f90ea79b7
SHA512cd46244da7726deb44cdbcead0aa1135d9013a4564e03f57cf2a746caeb2b984045e884ba4af4e24851a60054cfd42958be7f4307ed07910d888fb0880366195