Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 14:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-de.mimecast.com/s/kN3KC6WDJKu1n9ZwPUp0EiI?domain=sb-sanofi-qualipso-adoption.veevavault.com
Resource
win10v2004-20230220-en
General
-
Target
https://protect-de.mimecast.com/s/kN3KC6WDJKu1n9ZwPUp0EiI?domain=sb-sanofi-qualipso-adoption.veevavault.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133289881573368633" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 4732 chrome.exe 4732 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe Token: SeShutdownPrivilege 3888 chrome.exe Token: SeCreatePagefilePrivilege 3888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe 3888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1092 3888 chrome.exe 82 PID 3888 wrote to memory of 1092 3888 chrome.exe 82 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 1632 3888 chrome.exe 83 PID 3888 wrote to memory of 3180 3888 chrome.exe 84 PID 3888 wrote to memory of 3180 3888 chrome.exe 84 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85 PID 3888 wrote to memory of 2912 3888 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://protect-de.mimecast.com/s/kN3KC6WDJKu1n9ZwPUp0EiI?domain=sb-sanofi-qualipso-adoption.veevavault.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeaf309758,0x7ffeaf309768,0x7ffeaf3097782⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:22⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3176 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:12⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:12⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5236 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4756 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4448 --field-trial-handle=1780,i,7109110293455948181,368830926301859181,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4688
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4a050be6-a89d-434a-9149-47c1837aa1c3.tmp
Filesize5KB
MD56d6508f74c0dc2a85f2f54981240c823
SHA1e79edeb0c65f08ed3550db285e2e4c7d3f89fab9
SHA256a91422f91519b7a36c5e0d18cda571013fb36d0ff0fc2de19e0063efb632c6b8
SHA512b4bd26782fcfe7643505abc7b1f5c798c0c0b3d47d7837cad091658ef141dbe2cf7035dae067fc8ae2b4a122db8ee2bc26bfdaba4a4817748e7558b5e0e13bdc
-
Filesize
72B
MD5aa790c19398a82488a68eb9f4fb5d6e7
SHA1eb41958a34afaa4ce4f53f7e1904747ab1a160f5
SHA25628a30fbd745bc5708cc8e724c15115eaa73fe4764e81814e848f6480edf8aadf
SHA512c2da01d6228ec6409bd8288df192e7088394641fbd64fedeceac13323834da7889e8d6e8e50462ff483eff400bfd8e4e805fae260996146af292034db36980b5
-
Filesize
168B
MD5b9bdde4f2cfcc9b30ea57019c5394977
SHA15f624005feb6816d8b44b177056d654d0e98c1c0
SHA256027754b56df74b6ab0e7e905ed6095ba03345294aae0df6b80b7cbece4692772
SHA512bc64f848952df68430e7e4bfc8c281766add26eddada4719914795b46f301434105248e5c043e1fd6a63f5e306a77a4b1cc0d19d21de757eaf7d693fe37347bc
-
Filesize
1KB
MD5093d6061dbce33b27898c3c428315b06
SHA1758f947ce9fce524d00f922e9527e71df992e5d6
SHA2568d74eb8e0d2cc1936e156006545402559d481c097b1cd2adf78d7974300e852c
SHA512168bd8b61157949a3dd8c5fdb080104a9fb3e9148acc005b964726e9be3d7bc9c40a0532c8f07fe6a92762c2f2c510ccea58778c9b0cc5ee5aab85d89916baea
-
Filesize
872B
MD56824106087d408cd8bdc78d0363bf047
SHA1566600aae82507321fc5b860daf8511b226628db
SHA256b5a30117daebbeddc6a57f9fb6f3aca70109a693d2538c7306a84282bda967b3
SHA5125c7e073f272d14c3add78f0b447a1616e1f811a4182156202379c27a9895e9709c3d88c0382658fcdc42b80b7ffc9609b26671b332a8b37e23b2c05c9014a686
-
Filesize
1KB
MD5b1bcd0d02156b726e4a2e90cf976a86a
SHA1414088b8f6f682757889c6bfdded4151a9852ac9
SHA25667538ff0b3100504f8abd96d245b2c9f14a44df246bdde11ef44d7951477f5bb
SHA512984c7e332d39786c840109b7d4f1f099c0661d8ee177c990a24b09adfa15d8976be7a9dd47ab0ed655b12567ebf58863083ff6b79cac1c6b9aa66c8f36a82365
-
Filesize
4KB
MD5994fc8bf02e50819a2edf9e0124ef171
SHA11a336695f921cad2327e2d6085e3c011c38c9cdf
SHA256b45a949df285a7c53d4e98bcad7650e3be7721051e90fea5c7889642f3257530
SHA5122bef503c7484993c6cbe81540881307dda243063fd6b1b020e60bf48ec714588cdd093abca36203362ff9cef9fc84e7289ca60b9c557a6ab425e79cbba749ebe
-
Filesize
151KB
MD541dbadecc15f95e4566e78cc09938113
SHA11a3a2adcd7bfff860f28c6872f7c6bdf79026b73
SHA256a69ab5f51dd71ba40b94b2990946cebed72aefc70c782eeb43b1ff61cb9f22f0
SHA5124b0bd97dae4b87d990bb4b37df9c14079bed868d49e03661f64f3e59cea013d7ca39ea88ece0f6432dda9025d56ac3e0eb57cde66ec3c8eb46eafeb0be3a40c6
-
Filesize
102KB
MD515cbaa22fb134751753c9466385ef057
SHA1620098fd93af33fc45e47af38f7aacca05b0e8bb
SHA2569cd445c32a2e92ab1cd342de4c9064d7874aa78710679ce69c176d1777deca30
SHA512d59f5c38e0e239bc78e51900edac8bd15f17a4e02353113a3902b5b5f24b321a9b18076aa979b2cc7432d5dc4a0e3e4faea4f4234c96cf44f393b61e7c58e076
-
Filesize
101KB
MD543652458ec24cdff6a5898726a132738
SHA1c664c5e201120652165d76f90b1fc308ab92524f
SHA256ecf843bee01267e00f30832f5dcb789e495fbc768454d8c37e780d59a1c4cbf2
SHA512daabeb7f9a52cb0e8c572f2c443615d0cf2f3540869cdece7b592517021b24d22b8df926426fc76eac6dfa6c3559a6c30f99a3a04fc87995967ebe552382b91d