Analysis
-
max time kernel
45s -
max time network
43s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/05/2024, 18:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1244320817748381726/1244718662758174811/SPOILER_spatula.zip?ex=66562216&is=6654d096&hm=1c2d2444c8beac795d4a1a0d01d49af13c779bd52d136617022bb9b6b615b427&
Resource
win11-20240426-en
General
-
Target
https://cdn.discordapp.com/attachments/1244320817748381726/1244718662758174811/SPOILER_spatula.zip?ex=66562216&is=6654d096&hm=1c2d2444c8beac795d4a1a0d01d49af13c779bd52d136617022bb9b6b615b427&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133613087427418502" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1696768468-2170909707-4198977321-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\SPOILER_spatula.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe Token: SeShutdownPrivilege 5052 chrome.exe Token: SeCreatePagefilePrivilege 5052 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe 5052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3800 5052 chrome.exe 78 PID 5052 wrote to memory of 3800 5052 chrome.exe 78 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 4344 5052 chrome.exe 79 PID 5052 wrote to memory of 1128 5052 chrome.exe 80 PID 5052 wrote to memory of 1128 5052 chrome.exe 80 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81 PID 5052 wrote to memory of 4856 5052 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1244320817748381726/1244718662758174811/SPOILER_spatula.zip?ex=66562216&is=6654d096&hm=1c2d2444c8beac795d4a1a0d01d49af13c779bd52d136617022bb9b6b615b427&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff89914ab58,0x7ff89914ab68,0x7ff89914ab782⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:22⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2100 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:12⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵
- NTFS ADS
PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3996 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:12⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5168 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5292 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5484 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5336 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5780 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5636 --field-trial-handle=1768,i,9296163974697852254,51205018329073957,131072 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
Filesize
168B
MD52ddad34a0638e6bbc707960c18e11a3a
SHA16326e304717480d3ede0ebcea96d04e440111421
SHA25696e45098d584e5c6d61ae604d97811c9a0a92c89f3e2eb6d42b70a51e44fb1b9
SHA51228d290615c6aa8b742dfec98b0786b15df22a92f2809aaa9e83dce791143a41773afd8bcd4ac9f872c73126812a0b853db66918509fc32acd1622fca7e543901
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD592f9b39d2af0db5b00524596fbd25d58
SHA1b53bcea9ecdd2268d6e049f7035aa8fc848b1118
SHA256ca9860d195f4612b3788384c8f0e63830aca26e8739e19e8c53fd58a9389bf0e
SHA51270afbbabfb87e47c068f8f594cf1d6bdebcd3d08667a4abd568af75d9a72c507d0b1ca5e94f230327d546c290806bef5e9cbec65b11db8823886841306ef85f7
-
Filesize
7KB
MD58d8fa93d2c67675d1376c1dbb6333298
SHA1af4c99d7720c776ffcc8cff166a89b6b3fcd0208
SHA25677763b6061bd6ac55cb30e6ddf4b84e8b8d051bdfecd7c41767843204429463b
SHA51206686b7b6f67665abd50f08f18cb3819376256934d9a0498f47b1cccc34e86f109eb0fe238a8ebd76cc0f4f725dce7d16d1ab1ced7ddc7927a7b65bf4c7d440f
-
Filesize
130KB
MD5a7049a3ab24656893ef6b6018aa504a7
SHA11bfbb7706f3efa7f83b02a2988d67a226acaf0e2
SHA25699dee45fbcdb91a4d4d9969c69e38081926c7164f8eb510e7adfc78d2af187fb
SHA51282b1071b95f793dcfe5309deb41aca509ce706bf05c8d1d0167ade1dbf167ba13ba73a1fae1b67f094ca91b5944bf5bbedf71b652d0d9e25a3afba7af542c9d5
-
Filesize
781B
MD5a3e83b189ed2669fb0f46b0a5e0edc79
SHA105d6b51a5a2603abc331e4f58dd205f85e1787a1
SHA25607e03d953d2ec8a6c7d3efac21d26e06cf785a37f9a2d6ca11a61b08e665bdbd
SHA512e85fe44956ed1947314d64ece8765607ccce2695d7eb327a93f084c343df8a3a8d61efa38898ce9179ad7ae12845ae7bd96349ee2f5f95e6ff3dae75da933bc5
-
Filesize
227B
MD53471e60b8199e356a7254a90ac5205e9
SHA1e6ba2753758a724168cf122aaad77bf2b1617af1
SHA2563fffc19c669e3859cc3a081265f904705431a074df43500a7fabc86eb1260f70
SHA512e26f1ab4418e4c68bbb12e6b241e076e90173888b732cc806f40e845b89587bccc65d81fdcc042f62ffab90d1abc27e9dcb44340d4f70731a555d4633363db83