Analysis
-
max time kernel
47s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.txt
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
New Text Document.txt
Resource
win10v2004-20231215-en
General
-
Target
New Text Document.txt
-
Size
20B
-
MD5
6aea8b598935d2d3225c7c62be20ba80
-
SHA1
1b4ad54b57e6cafe0ad4185b3ba227f3a1f430ee
-
SHA256
0e948fe6dad5965e43861fc75b558146d43f439309eeb90ba9f2b729c63f8759
-
SHA512
28d510e8ed2607554339e225d27487bec958f8546f21d41e98972f1ab9376edb309871616eb670b889e4c6b795963409c972bf8e1e3888fea9cdc1d18b9b0e3d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe Token: SeShutdownPrivilege 2656 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe 2656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2760 2656 chrome.exe 29 PID 2656 wrote to memory of 2760 2656 chrome.exe 29 PID 2656 wrote to memory of 2760 2656 chrome.exe 29 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2524 2656 chrome.exe 31 PID 2656 wrote to memory of 2556 2656 chrome.exe 32 PID 2656 wrote to memory of 2556 2656 chrome.exe 32 PID 2656 wrote to memory of 2556 2656 chrome.exe 32 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33 PID 2656 wrote to memory of 2648 2656 chrome.exe 33
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\New Text Document.txt"1⤵PID:1752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7119758,0x7fef7119768,0x7fef71197782⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:22⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:82⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1532 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:82⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2320 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:12⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2360 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:12⤵PID:896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=992 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:22⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3184 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:82⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3684 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3864 --field-trial-handle=1224,i,11626833880666920008,4973004586841241783,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e73c2f323ce61fa28c0e7e184a402ad
SHA1ad778db059a1d4c5ffe264057c371e7a8b64df93
SHA256b979af9dae78a287692b913229bc3c2c56ee9ccf9fe4017680f681b06ab6ab21
SHA5129ce187faeff58f07bf69ef5d79c41d04d4ec39e970fbf9bd6c56bfe5aab6be658f93e741076b0c123f768abeaf9532cccaa3ca793e54301900d968d736ab9497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc9adf192d88047c8f9e370cd4947a53
SHA1b5c672f8166f14bba893fa210bf3a3a973265431
SHA256af0faf771170e51800beaa93dcf66730f62417bfb7814aa5f7156a4b626cc13e
SHA5125dacaa660a7e5e3259676d1330c1ad59d09f7a44001842d3f3dfa5433bb6bca87aa52333fa95f0dbeaa540b39d9b24f375d4b6bba3e1b0aca735c2a91d393ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a48cd0ad5b88c5ac8fe0dba79f99610
SHA12cd5f0552c494f6647aed0fa5969b236d1f4a57d
SHA2563f7ef0bafe8bda9c86c3f9b7ad24f257fe37b6fe358f17884147a4e78e37009f
SHA5124dc831e18ba8092e50c3b414220c091ce01735f65cea53298b9f5a2f5955e676ba88ab6480d75c9c925ab158ca7da9700b125819a536623785eba99302030343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2de60da8e287382ef05481f18871964
SHA13338bdf2a9be93e2d52dee6b6bcaba64fb84ab2a
SHA2564df7f4334b88ae9a6b48f1f18c32bb9bf67c9dc4e4fb739d90dfb3c96898d7b5
SHA512272487ae84a36e620a9cfb5c2851a0fbffe62c5284cf8b96f3442fada9094c1b67ed674b27defd77c9838c452ac451b0375b2abfc9efdaa12e2c4534f9ad2055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1722c52d5e045863894bb52ebc7c6c8
SHA11bf740b1e1ec26fc92ba3040bb1b2df93a2cf49a
SHA256a3da639101e5c371262fc9d8fc3027f701a7817223c0709021c29ded0a7016ef
SHA512efcf4b72d7c0dc7a4b2b65198aaeeed4fb5a30946172e6c14ead90afa4dfad4b18c688ebc3527983e41ce2be00f23df8f2d1f6f28e0b9a4a6a094ab7e0f77809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597ba718b6eb1b9c66f9a0f24c590ed88
SHA1ad414476446c5eca1715dafd9feb58be3b447628
SHA25698654fea170f61f9faf4ee5665dc672e963e2bad0eab0fc9efcd19b754aa25b6
SHA512871bb8b08af839dd47e0b9da6beb2254a884ee42d70425379188f70d980501620a556ee4e9be95c415768474c317ca39a3ddc31935339ba66751b3b3824d340c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\07e824a9-c717-41cd-8e72-aade72f9643e.tmp
Filesize4KB
MD59e392c1fa61a2b74d92a8a7b26602e55
SHA1029414771d55e2fe996ca8a0e92b359c146cf9a8
SHA256b8f7cf2a670f8be216cec5bdb611829c9a6a416eb37d0ec876d51850b9064ecc
SHA512be76643e32f7a80c213c0bc3d41c33e371212e317a63a8d56ea202542164d0a41e7cef289e8f9cf21b3d9aa500646cd70703054e7358428ebebb4695b646e076
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD5c18d62eb18dcce6bf867e674d337ae23
SHA10352d26280a562c4eb3f2d6a59c0f0ec2dd2a905
SHA256e6588bf498034b5a7cf2e671b536c25d487b37a0f373696af258864ca85a416a
SHA512c85352a975d6b05abbcde4365a7fd72792b218102378bb81143f1407aac37d8f08446abbdfeeb9a1943958e3507b3e7a976a94a992ce1d351dc28f0e1c027a35
-
Filesize
4KB
MD54c12d85cf4e7162f91f9734d18ba6828
SHA182cecd1b99fffd46a29001ad02595202bead1cd1
SHA2562e7e46d5aa032f6712308c902742086919611a8c77210dd0e50fc44dbba2f06a
SHA5122f52c6562ebe5ab3e31a315c3faafa12b6c818c01d1231143a9ce86b289707b14459570ae892ae9b7873e35c02915151b03ba3886114ccc7688c9c3d4f2d87d2
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06