Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 03:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://padlet.com/michaeleddy77/interfire-agencies-request-5yhfw0ycfcej18h9
Resource
win10v2004-20240508-en
General
-
Target
https://padlet.com/michaeleddy77/interfire-agencies-request-5yhfw0ycfcej18h9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133601315995341825" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4084 chrome.exe 4084 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe Token: SeShutdownPrivilege 4972 chrome.exe Token: SeCreatePagefilePrivilege 4972 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe 4972 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4016 4972 chrome.exe 81 PID 4972 wrote to memory of 4016 4972 chrome.exe 81 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 4224 4972 chrome.exe 83 PID 4972 wrote to memory of 3348 4972 chrome.exe 84 PID 4972 wrote to memory of 3348 4972 chrome.exe 84 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85 PID 4972 wrote to memory of 532 4972 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://padlet.com/michaeleddy77/interfire-agencies-request-5yhfw0ycfcej18h91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fffad9aab58,0x7fffad9aab68,0x7fffad9aab782⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:22⤵PID:4224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2212 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:82⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:12⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:12⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:82⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:82⤵PID:5044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1864,i,16047704932341168477,11022110028259878781,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51a0cbc573814ba4636c3856b51af9ccf
SHA1e4e9532afeaaa6bcc5c78c449868f3bfab0efaf4
SHA256c1527d2bd966f88ac242bfcd851c4ef445377ce3e399f6058e362da66e313a1d
SHA512b7144ccfbcaeee64e2d2a50425dae121a48d499152592e8353e18342b684806c37c0f091462d6e7f272925a9f72786dff8ef3d03d0ace5a30127cae45333d4b8
-
Filesize
3KB
MD5e25c008c2904f781c856a9d748543dcd
SHA19dd6bb5607aaf3eaa7c40734df89fe25a7235cd9
SHA2566dc1e8f288aa456eaa3f8353af0899ed875a109bc7f44a3648e9eb731096622e
SHA512efe9d8c2bde571b0301f6f6fd22afbab1874efccf648ae5b2d1c2acd600b9857eb5c4310268ebf79e7184d5a689ede5b2ae04d0c297dfef654b3833f18cdc76d
-
Filesize
1KB
MD511a9752d6b1ede7faa5be04cb41f3dd1
SHA1b8678424249675419349957a0c7dd275fda6cde5
SHA256202567d0e60d1139d598a172c7d1c4a3a626379cea624b1fa3e772ad28cda70c
SHA5120e3e8256ceb1158a5b65b538c8cf21c4d89213ec948a487c238279702ac3561ca6175d592b97389c6457fcfde657981e0978ac64c3145cc67123b9bd451704d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\f7a877e9-fd65-4a78-934d-920fca81d21f.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD538b0a8033317a3659c465a74aa54cfec
SHA158aabf202d604c346ef04457c346b154680f6b9a
SHA2567dd3eb0bb976596f103eb9c800f569fb92196e134c9a8219a6a48d622eb71173
SHA512983971b7b857b93668e062c30f343d29f37e50384b7385671bcc97d205cea77baff813ed69772dfc848c9a8334beaaa6dcd6cb9b68d2e1a95e7d9b7ed1b0ca0d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\44e52888-db53-43e9-a3f9-f70a4e37e134\index-dir\the-real-index
Filesize144B
MD579e8ee096b4e5e1da37feafefa9b14be
SHA184d847bb3b7618ebd7f86db5121480484d7b4a36
SHA2561f9824c573c71df436e8de418db49b0aef704dadb09f0ffe3ad5bd44be91c8e7
SHA512e00fd20b371d5f5b11162a9240a1183dabee1179ec1d6cdfa84590392c08b216f9b91751bd27a63812a19cec8db4b338be76b112a49ffa8329d61445cda730bd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\44e52888-db53-43e9-a3f9-f70a4e37e134\index-dir\the-real-index~RFe579c01.TMP
Filesize48B
MD5c39cb8033d0d28f8a9a6f2c63186b0c4
SHA1c75ae1f8bac4654be91d077d7b1aca51a7b6ce01
SHA25636388e18c0f77605b5d70ac6aa4572a004ed31e1d6daccc0ffab542612dab2dd
SHA512691dfb22ea41bd04086da8d3ac7a3704cb89352afea7edeafaf436dccee53a2776e65cff85f075165a73bdb1f5eb8dd6f10db766497d6cdd652e8576d88fa1b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\index.txt
Filesize115B
MD5624ce3287ef485adcb5c1611b107a7ea
SHA165135a2d244746277ffddae37cba1e9c5e01c0b8
SHA25623b071d5e98ae3f9e0252e60c608035aa3d8ec9d0dfdbf474ee8cad869eb4a8b
SHA512357e53053c6425e655ca5e3a6e3bd7caa261c8fd1d6d819150e0eaf5c25b157c3ad28c1e6fbc6373f50d81b97741049f82b5c2d977bca0640b4cfdc7ab86ad8f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\11cf67ed8a99b1f7c507807344374751b409497d\index.txt~RFe579c40.TMP
Filesize120B
MD51590a308d00dbe753d46d45f7c4e3fed
SHA1b0d251fcd88e03f145ace30e4f9fdb5dd0c78bef
SHA25612d1d64fcfcd77900216d5af41f88cc69b57b8ede7ea6781c155614caeecfb64
SHA5121f74cf47d51bc5fc7589c7f267c158944b76bb305227b8bfd3ce067f1f46e9bffc22ab4c21ef63056be3343e25c29c6c1b4f6fbfb2cd2d39d433c8a9446d0a95
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize168B
MD55f0f1edfd5e9b93cf5673ed053da1afa
SHA137397092298903a050fdc90ca68fb596d8ba6ddc
SHA256e4246020e9c1409c84a094be18afaab52f43228a31395118cf65ac1cee74f8a9
SHA5128e95a64788260e4643feb0aea46a4123380b35823058e8f3ccc9eef227aebdf8525a8303dd92481a58f0e08cc02b54aaa8a94682428c3604be918bd72c5be38a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe579ab9.TMP
Filesize48B
MD5cbf40ee1f25ab5142fd7c8ca56e6eea6
SHA1050ab2bf745c0b64eb28234b4fbaee016b654edd
SHA25676cf09dcb62fb3799b6a712d1335e2bfe6350ee210711d6ab788e97aa0fc10a5
SHA5125ad805e36caab3be99e6c2b75e0c45020f5efe7136b8466f52b7ed62b3d3a406564414252fec1e9a7f72b5f1cf2114b22ab0716b8f8737cc46b7881f6d2731d0
-
Filesize
255KB
MD59a9d16b1706a43efc889a31fdaea8059
SHA19442810877f2484b8b05a36b86d76e83b408e5f5
SHA256ed3f435fcff0c0683090aa1d103b6fbbb262d0f06fda819fb78c2eeac267f92f
SHA512117aeb4370623618d191add52c4f79b1355d8f423bcda4b0b737e19be0cced4a64b9855a6c908234f4d3411365c0e0d31620875c77ead65913d0b4d12213b8f5