Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2023 03:30
Static task
static1
Behavioral task
behavioral1
Sample
EnableActivationConfig.reg
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
EnableActivationConfig.reg
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
KMSpico.rar
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
KMSpico.rar
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
NET_Framework45_Full_setup.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
NET_Framework45_Full_setup.exe
Resource
win10v2004-20230703-en
General
-
Target
KMSpico.rar
-
Size
3.6MB
-
MD5
7e5feda84e0420546e5741334c98e5af
-
SHA1
557106a12926c4898f59dd7e39663f3b5fafc313
-
SHA256
2a213313c073e2003e8c5c2bcbfc7a06fec960ed286cc59b4054b9899bda52cf
-
SHA512
4e11536eafc8cfd4c0953414cd9a09993733d403e1a9370e3f9bf9db224c225d6c5c1c50e593366f79deac8c9f7db63e06fdf3fc6999536e124826091009e8b5
-
SSDEEP
98304:F7zCLYdsM1uBemsPgJ4KKSUyUS8TNe16FxAcMhc:lzCLguwLP4bU1LTNiCXMq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133376670619798183" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 1492 chrome.exe 1492 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe Token: SeShutdownPrivilege 4584 chrome.exe Token: SeCreatePagefilePrivilege 4584 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe 2692 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 3632 4584 chrome.exe 92 PID 4584 wrote to memory of 3632 4584 chrome.exe 92 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1216 4584 chrome.exe 95 PID 4584 wrote to memory of 1052 4584 chrome.exe 96 PID 4584 wrote to memory of 1052 4584 chrome.exe 96 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97 PID 4584 wrote to memory of 1556 4584 chrome.exe 97
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\KMSpico.rar1⤵
- Modifies registry class
PID:492
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda63b9758,0x7ffda63b9768,0x7ffda63b97782⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:22⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1764 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2920 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4680 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4864 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5028 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5344 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 --field-trial-handle=1884,i,8355873770651474499,1708355067110963394,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD562fff39ff45e0808e6b7a0f3e0a29849
SHA132be6f0379ac82cc37a228e922f16b362e7d67ac
SHA256d24b919a95f5c80bf347750e1d5e70ae9d8ba6461c1681a3ae231c80bb9ea4c6
SHA51227926b0b65ffde0f424ece6b38a1ef273a193a8b6a4ea04dbf3f2ba4ecec19310734313c0c33e12f294cc298087948a06ba46c2cc0aa7bbfd36b41b56d8aed3d
-
Filesize
371B
MD5bd0b7aab7744142cb7d856014994cf48
SHA1c0361619622a7873eecc18f9b8efdc3961508c26
SHA25692c245f402da8270149beddd12ac8593140a327f8ea69dd7d118214210c0c52b
SHA512d598d18993cb683a8f0a814a36181d0dde168675e8756ee8bf4d0927a8363f05ca1809b46c3012dc4c97c22deeb53b72476b100a203bcdafd428601b1fd223b1
-
Filesize
6KB
MD54998bfaf3e90a915fbb55ef0b0678ce5
SHA178658100932866a667e4230cdaf1c2c1bae28dff
SHA2567678f040633ccea088c1b0803f74235068a3f5e6f3e4c55bb3a796a9bcc67bba
SHA512911d1d378aaab0601e1bee8d445042d676324861a3b60416d54ea8bb964595bcb121937ceb6701bd1f55fd49f9c2c2f0d3b3da9b3e595fec1830de572a5ad9b2
-
Filesize
6KB
MD52147cab2c40b8983fcf715c00cfc2bcb
SHA15e3cdea00f74d7af52dfa7d476741279f8d18089
SHA25636456f9d670dc0e4669a11555919947a94cab954fd0825a9f9e8c9a898d48192
SHA512cc812b53d25c4eb8ed47de86bcf901b838e502bb9facf64f810682e25dddee4a7277fce703641c8a4bd890facb5a7eefa79a37ed1fac7370a8c560f5a14a7452
-
Filesize
15KB
MD512876cb83b9101adfd56b946029ff2e3
SHA120935c0d5cafa2da186320e9d754afbb614d6c73
SHA256cb29830ee139ae3edf7601e9112eb38ea365f4eb0de6bf25c740647306f632ff
SHA512fcbb1c2d7ad4c7545e12f013c91b146eb95bed4116ece5c487640d245d2e3f89f78a7f0ba95996c635da982bc221ad755d7a041bc9ef95577d3bb893b802426e
-
Filesize
178KB
MD59db7b1d7c60f9bd0c8a2e15cc3601077
SHA18960696f3400e9bb43965c3a637010d9a1095ffc
SHA2560a37be722c47e0c64a83a04baf34a6cde55abd7b05ed3c5b05a1c5fd61ed7194
SHA512c3ac6c6e828bc2a252ad108574bf41a42abd840609c1b0072fff01672c9a509a671b354aaf084ce23fa46b5f40069dba9a6270df5a1dd5a012f66349f9913bf7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd