Analysis
-
max time kernel
113s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 14:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/860376196634509322/913307612051804170/Muscle_Memory.mp4
Resource
win10v2004-20230703-en
General
-
Target
https://cdn.discordapp.com/attachments/860376196634509322/913307612051804170/Muscle_Memory.mp4
Malware Config
Signatures
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4692 vlc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 4852 msedge.exe 4852 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4692 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2256 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2256 AUDIODG.EXE Token: 33 4692 vlc.exe Token: SeIncBasePriorityPrivilege 4692 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe 4692 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 1940 4852 msedge.exe 83 PID 4852 wrote to memory of 1940 4852 msedge.exe 83 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2240 4852 msedge.exe 84 PID 4852 wrote to memory of 2652 4852 msedge.exe 85 PID 4852 wrote to memory of 2652 4852 msedge.exe 85 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86 PID 4852 wrote to memory of 4280 4852 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/860376196634509322/913307612051804170/Muscle_Memory.mp41⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe0bb46f8,0x7ffbe0bb4708,0x7ffbe0bb47182⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14751394631620729250,2670237486036061437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:12⤵PID:448
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Muscle_Memory.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4c0 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:2256
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD58c358f84bed9b39e38070406c6d7834d
SHA1d7ea35b7bdae9e26929c0c45424bb88e66dd68a4
SHA256ed8a7358e6cf3e65df03d631fe796d48946907a9b6aa2335129d250a3081077e
SHA51284b331d9166546fcb6f2392e68998304cc1c3a11825a143f850a65b26a94bcb90f441eb5178917ccd7aa9badd26ff71c88c4161b7a9c60a6d5c19db5bc010b61
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5fe7730f93ccafeb116da405ecc11cc5d
SHA109169c86cfcfb0457a81fd507c1d4e143267bac5
SHA256986b0f73dfc2fcb7f96a3fdc4ca463d1f354268b21d5aa6e78de2f39e9f08a67
SHA5122523207d912673e5c32ad70a32b631a7821ad724fc3679b5a06bc94ebcaa190fc9b546fc9a5a4d8fdca8153c3af6e292258f622f2d21e97320b8995d7eddf9b5
-
Filesize
5KB
MD54da6a895256bfdac91cdaa7589a9fb16
SHA1acbd14ad0247145d000b52d3e0b8baf9e949f7c6
SHA256f5671b2d0f9cfa640db081b346a400720384b4304b04d97599a1a187960693cf
SHA512b97031f9006f296af88cde0240f35aa3da356e32970ab31bdbb15ca0c70158b6523553c0fc0a04fcbb2813da9532287576b3c8dff28866b09783e8ed3b8045b1
-
Filesize
5KB
MD52ae92ad9c2ed2889e888773c712286e7
SHA19a7a12ae592b3666af5725b1ba1c6b0d38adc3a3
SHA2561e78c1eea6302f134c1cbd436d3bdbe2822240381276c043f7c9d0c09718d5be
SHA51242900ae44e3cadf11642d7d05979af1e76b1ff4a21097858f5dc9c9cdcdab51842fd0a45cc274a93648cabe41d1451b0d9db9fa54f096dabe3f9569c6dc98085
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5d2594aba80bfad88e630188cf163e882
SHA1408c91066b4ee76253f96e13bd0658f96b535880
SHA2563f996336a5001afbc7de28f109f0d29217d8b3c3f1e4da724006207771425eec
SHA512385cc0c93e6a5f965e75f89c07cdbe7293678edf04d8044bb8abb4ce2cc5277a8abfa38f8c404380032b2b3e3f702c5de0d1eeae2c712af669fd07b33b60816b
-
Filesize
16.9MB
MD5cfca5b8e18a78b44d9325f5d8380e6f4
SHA1caca2692b89ed19e49ad87e52c1a393c6f4f5933
SHA2569bc3e60d0cc71717c973f7ac9cb2df9444742547a63d60ea3425a1629221b4b1
SHA512c130226aa917f4a0ebd25e2b4f34e132c2d766867f11b554ed41e65e0483b8c025eb9a70d57f9510a16a350f3d23df8b25528b148fa4b9004312815ad4fe6a77
-
Filesize
16.9MB
MD5cfca5b8e18a78b44d9325f5d8380e6f4
SHA1caca2692b89ed19e49ad87e52c1a393c6f4f5933
SHA2569bc3e60d0cc71717c973f7ac9cb2df9444742547a63d60ea3425a1629221b4b1
SHA512c130226aa917f4a0ebd25e2b4f34e132c2d766867f11b554ed41e65e0483b8c025eb9a70d57f9510a16a350f3d23df8b25528b148fa4b9004312815ad4fe6a77