Analysis
-
max time kernel
960s -
max time network
964s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 04:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1BV-L0OO7v40DEs1kd1WRxD3rLINski87/view?usp=sharing
Resource
win10v2004-20240730-en
General
-
Target
https://drive.google.com/file/d/1BV-L0OO7v40DEs1kd1WRxD3rLINski87/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1300 msedge.exe 1300 msedge.exe 832 msedge.exe 832 msedge.exe 3992 identity_helper.exe 3992 identity_helper.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 832 wrote to memory of 3620 832 msedge.exe 81 PID 832 wrote to memory of 3620 832 msedge.exe 81 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1772 832 msedge.exe 84 PID 832 wrote to memory of 1300 832 msedge.exe 85 PID 832 wrote to memory of 1300 832 msedge.exe 85 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86 PID 832 wrote to memory of 4052 832 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1BV-L0OO7v40DEs1kd1WRxD3rLINski87/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeca0546f8,0x7ffeca054708,0x7ffeca0547182⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2156 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5788 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10503053822739900743,13323563245112371255,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b55d2d2ff2a4d5d7eeaff5ebb96f3b4a
SHA112d94b9e84142b10d6347a2ff3b634a20f692c7a
SHA2563d249eae36cfc3837b043e4b8df670724fee5657b302c77d488f1da3d835f776
SHA5124dc2fe1eeaca5f9c91d548c70a44ffd12b806a385e22a3c5f724b6f749a15c9ccb3ac1a752c63225bd4d1d90f2b25d8004a15d3912ca6a3cb92fcba91248626f
-
Filesize
152B
MD594c981336abc388ca817dab46e7fc547
SHA12d0f8d89a31adb0aad5c599a195ff40ecf4b161f
SHA2564d44efbb5447fedc3cb21311290fe6a9d0e5a0e682387a1a341bd214df820ef2
SHA512f1c9c98f6642ea3b90c8667a4871d5a3b8c05eb0c50d5dc31e32704e0eeca1d33add414df485aced130523d6be824c48e37d0022b4d58db60006efe3e337fdbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD52c4420b748a6fb368868d566ea4eda71
SHA14776f87df476fa0f94f86682200345e45ba25f56
SHA256c0f3e6f851b91d48da16659db54e41889d49c9559edc8ddebdba1ea90516f751
SHA51294576d5dafacb5114642afaf71559eced09ce28e7c0a6b832a818f638349596ea98187b52ab2cd1ef00ec25c6d8bbae8f930fdb4b255306c80dbcd6db5494ae7
-
Filesize
3KB
MD56d1f17bbd99312abaf6fcee546ac5e51
SHA111cf8ab6b691ad194cbb744d68370c47a173799b
SHA2568c0b1f897bac28d62a323b1b16aa84618889458b366bf0928b20366abc88b6a3
SHA5120c96c872628306027b605a1f08142ecff123665cde01e383cdfdaf987915bc04b6474bdf52037ed78a73a34c59c39cea6deee29bc9fc695f6f782a5aca281ec8
-
Filesize
3KB
MD5881fd71b035b1087330e7b4c8d6a1f5d
SHA1f12fd8c82fc3fc32a26caf8de37b59d709e8150a
SHA25695d151ce09497cf65d124a76574461f91f5dedc970ded01fd382f370831ff18b
SHA5126761f400395dcfd0774b824d27fc19a49b2cf43f09d6d7430b5fbd02011439ed610e7a89a80f81dc897c51aeeefeadd9e499d880a9092bb10b9a3312c4290a20
-
Filesize
3KB
MD548fe0a16a8a23931e03ccf379c26a0e1
SHA1aa139a893a44b77328d83e052ff19b9fe3522f4d
SHA256c6656d5b4641d8cb0f0425748716b4b0aaa44592fa50d7f6f29925afeedfefde
SHA5127e6fda367747e8fe8fc87f03ca1d4aed0116fedc58d63cec7bb22002194e812482d09110a647f53f7c2c323499e153803f0a90112ae8df5c666e003a42b48e69
-
Filesize
6KB
MD5ebed4d01ae92b3a161b7cb29decaf53f
SHA15acb214f026aa2f51eaa35eae845a04c60884f49
SHA25609172d14b631c54931a8262f55c8b60456993dea8f22db90e11130a6a5820e9d
SHA512c9fc821747b910b7eba8a5f4943168ef770bd826e0222d57303950b02eaf520d82f97c0ab342e0c972e76d4cdb6c35c2292cc62e32cf1a328b29a1eb9489068f
-
Filesize
6KB
MD50c7cf1aafde2b292bf66160e7ac89547
SHA18fc1d2204e957d3f0f24abcdab28f70ad3a95584
SHA2563f966d291c13644e3bb0fc5e9ab51908cbef309dcaebc12aa494649bad23085b
SHA5129bc5b472787fbf5eed09e1b9d929272a7d9ea0860a08bd34993d3df3c08bb9b11748e80585c523f6038218e8bdd11b6fd45ecc74af46ef5e5953dfadc7c6977c
-
Filesize
7KB
MD54e7c49cd5e71cecdd14e53676568637f
SHA1f8e38759afe5c8368602003575d45e983fc8aeab
SHA2563c5ca89806900541b3f2815b7aa5e9b0a33732bda2638e0588c8dae5bb51a196
SHA5126344cce6021b9f13deda76ee6dafac8bb907ff4497221854a24861159cef4aca7af45bc6df7965d7efa4f46742d0bb1b443fc3a3abdc9a5e7f3283694debbf70
-
Filesize
874B
MD557ee11038ea5f2fa2c85ecedaa6b198d
SHA18f7223e335d3ed3b3da84bed0e79eebb3b1ce73f
SHA256c5235f56351aaf0e7ef0f6320dd0d196da0dc3a5ab19f3220e5ff3bd081242f8
SHA51220780c8d174f6cc034402d8f15459d7220933db927621b77bfe4da7449d13e47c77102e3b2617cd4f6ae63d05f09ac1e1400d0ca39da093e2253a2bafaa0c413
-
Filesize
874B
MD572c604c31a19a471378d7bd5596ecec4
SHA1218a7863d9549691107e3aa299b09dccc26bd611
SHA256e65aaa8524a72b2819a3b1f3ec415d785c0e3a7830b7cee27a26f46b85e36fcd
SHA512caa1fb23860a4aa80131514042a7579c6078a56c35693d619e81230c13b9f456e8abd3e3b54a791d24282dbf5fc6edca89e089f212e9b3b69879cd49f6a1c8be
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56bf5f855e21e4cb0237ef808ca09e28f
SHA1836d123b62786ce585476c1ef13c0e2bc6e5f70d
SHA2560f297c83e1951eb88c1dfb9c2923c93d6fa911bd76ebde59ee4bf93479245955
SHA5127553fc18de596399f9624c37225d5a9d0c536257ddda5c1537a4fa2c62866ce5151694a2479d001c0dc8cfe13a9a37e4d18304e4a6c5ec2127b379e55d27d6bb