Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:09
Static task
static1
Behavioral task
behavioral1
Sample
130be10e503004cb652d838cb28d985e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
130be10e503004cb652d838cb28d985e.exe
Resource
win10v2004-20231215-en
General
-
Target
130be10e503004cb652d838cb28d985e.exe
-
Size
441KB
-
MD5
130be10e503004cb652d838cb28d985e
-
SHA1
97735414841cce2b6e01dcbec55866cf393b9858
-
SHA256
cfeae44425361dc32d4293313d7d380f3a07ef174fe0ceb0e0006f7181c87f72
-
SHA512
c0754d3f44f824c048c649cfd30df2a2bbe5609be9014f42106927c9798857643d202a1f61d9ecf23604581dc62f517107cf3ca4397cabd448fc22efe1c33367
-
SSDEEP
12288:3+i4OPDSTX0dZ+XPhFaioyyRhX9y/i5GDQrf:upbQprBff
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4728 TMP.exe 5048 is-J43SB.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4380 set thread context of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\TMP.exe 130be10e503004cb652d838cb28d985e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 4948 1108 WerFault.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 4904 msedge.exe 4904 msedge.exe 3324 identity_helper.exe 3324 identity_helper.exe 5656 msedge.exe 5656 msedge.exe 5656 msedge.exe 5656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4380 130be10e503004cb652d838cb28d985e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 1108 4380 130be10e503004cb652d838cb28d985e.exe 27 PID 4380 wrote to memory of 4728 4380 130be10e503004cb652d838cb28d985e.exe 23 PID 4380 wrote to memory of 4728 4380 130be10e503004cb652d838cb28d985e.exe 23 PID 4380 wrote to memory of 4728 4380 130be10e503004cb652d838cb28d985e.exe 23 PID 4728 wrote to memory of 5048 4728 TMP.exe 20 PID 4728 wrote to memory of 5048 4728 TMP.exe 20 PID 4728 wrote to memory of 5048 4728 TMP.exe 20 PID 5048 wrote to memory of 4904 5048 is-J43SB.tmp 114 PID 5048 wrote to memory of 4904 5048 is-J43SB.tmp 114 PID 4904 wrote to memory of 1524 4904 msedge.exe 105 PID 4904 wrote to memory of 1524 4904 msedge.exe 105 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 3420 4904 msedge.exe 111 PID 4904 wrote to memory of 4892 4904 msedge.exe 106 PID 4904 wrote to memory of 4892 4904 msedge.exe 106 PID 4904 wrote to memory of 4292 4904 msedge.exe 107 PID 4904 wrote to memory of 4292 4904 msedge.exe 107 PID 4904 wrote to memory of 4292 4904 msedge.exe 107 PID 4904 wrote to memory of 4292 4904 msedge.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe"C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\TMP.exeC:\Windows\TMP.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exeC:\Users\Admin\AppData\Local\Temp\130be10e503004cb652d838cb28d985e.exe2⤵PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 4601⤵
- Program crash
PID:4948
-
C:\Users\Admin\AppData\Local\Temp\is-823OP.tmp\is-J43SB.tmp"C:\Users\Admin\AppData\Local\Temp\is-823OP.tmp\is-J43SB.tmp" /SL4 $401D4 "C:\Windows\TMP.exe" 53192 522241⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.eset.com/download/index.php2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:13⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:83⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:13⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:13⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:13⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5304 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1108 -ip 11081⤵PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5aa846f8,0x7fff5aa84708,0x7fff5aa847181⤵PID:1524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:81⤵PID:4292
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:11⤵PID:4960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:11⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8372680751788731063,462194721521678183,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:21⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e77545b7e1c504b2f5ce7c5cc2ce1fe
SHA1d81a6af13cf31fa410b85471e4509124ebeaff7e
SHA256cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11
SHA512cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
180B
MD548f7e55eda12348267d09d3fcc49f220
SHA1e0f49cf24949f919e03deba6f74da95764468823
SHA256f3e853f7510ef35782501ee247e5afb95d8ac89e6d8a78019879dd98fc79828a
SHA512aab4f25b03de3b4fcef193ee8a64eec4a73c4155ef9b68c0acf484c6ea8f962cabbd60f162cb8016109fa2ea0e1adeae9ecd1f4690cc422e16c4031594740e87
-
Filesize
5KB
MD502b25b861db3b853c1e4467051f19d0b
SHA11e8ccd977b0f557929cf787ec0c765ca543a8281
SHA2563d772e7a93adc245dba078ea5683206dde50df2e6d0d9683ed2f31bc5ac26de9
SHA512fadb8fddc0f6f4064cfeb6c4e90ece37e0c22eddbc1a6a043f17012a501ba53e8e86b16e62b68d185595dcc8cc33a31b876212fff7c1c950b82ccb277d4de55e
-
Filesize
24KB
MD56db2d2ceb22a030bd1caa72b32cfbf98
SHA1fe50f35e60f88624a28b93b8a76be1377957618b
SHA2567b22b0b16088ab7f7d6f938d7cfe9ae807856662ce3a63e7de6c8107186853e4
SHA512d5a67a394003f559c98e1a1e9e31c2d473d04cc075b08bb0aab115ce42744da536895df2cec73fa54fc36f38d38e4906680cfacfbf4698ee925f1609fbb07912
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56aa0a7efa0c0a3b4e104d8ce5affa572
SHA10b1a44a4b3a660156889d2fac819e3ebe7d03aaa
SHA2566c5fa685eabf589cb9c893c2b829d295ce1c085f83f18f32024f40fc99ddce48
SHA512844f9606b9efa8f52680703b7a67c9da5a8d6f31c7cf0ff860bd2e59bd7a83d108e384d8d052a5227918d558c18c66c8c521fb4d29ffc6f4757d31103e1b21fb
-
Filesize
642KB
MD53e3bcc934ed31aff244ce799c2725afa
SHA1a79626f034e7309c3e531e5e37d264cc159ff7cf
SHA2561a3dbfa3454546f18353e4400ebc8d4958d596cd750f6d626f19bb6956dd398e
SHA512d922d01cef08d47428246d6a1b9cc91f525273d4efcd8bf291dac94a73fd8b2c3fed80cae5a0da7b73e85fef3166aa751098e76d27e9bcfec6e0901b00402b9c
-
Filesize
371KB
MD59bacdee05bc51ed2a6bb9c1c7836f55a
SHA102ebc1d90cdf77d8aafc8bcf5d69888a39bb523e
SHA256c2c762983f2947ca8ffea082e6ad9a4d8b9b43c20b5f04248c8fd87f79599205
SHA5126504158a9056171f5c4b62cee37bf8a512a696d940bb3115fa4afd904abdfbf85dbe24a42ae7622e1d99c6742095f6d315292c1ae05bdec723e8719fd3c625c1