Analysis
-
max time kernel
80s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
slinkyloader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
slinkyloader.exe
Resource
win10v2004-20240802-en
General
-
Target
slinkyloader.exe
-
Size
18.4MB
-
MD5
a2223005e6d186689577e5a2b785a16b
-
SHA1
1075e177247880d3e1ec940623500bf2e9b275e3
-
SHA256
cef5b60321f17991400a19072052535638c0a5c02d338234686552deadeea82e
-
SHA512
073f8e682d2468bfe7d55b82cf0ff5dafd2754da2813de2116551e2811809debba7f06c5d8ed5901a59703bfb306fd5fd05d9d1e797bf9e7887826709c6993c6
-
SSDEEP
393216:cKRqNWNKROYkhkpXorNv+oXsDS3LNK3HOU6x0pW/lJktSrZPLAB:/ANWKRrpYrNvou7NK3uU6E29dPL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4656 chrome.exe 4656 chrome.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe 4020 slinkyloader.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe Token: SeShutdownPrivilege 4656 chrome.exe Token: SeCreatePagefilePrivilege 4656 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe 4656 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 216 4656 chrome.exe 88 PID 4656 wrote to memory of 216 4656 chrome.exe 88 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 1320 4656 chrome.exe 89 PID 4656 wrote to memory of 3840 4656 chrome.exe 90 PID 4656 wrote to memory of 3840 4656 chrome.exe 90 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91 PID 4656 wrote to memory of 4816 4656 chrome.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe"C:\Users\Admin\AppData\Local\Temp\slinkyloader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9b85ecc40,0x7ff9b85ecc4c,0x7ff9b85ecc582⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2124,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2176 /prefetch:32⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4872,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:3696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4996,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5048,i,16589755802753998608,1838985438757022219,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ae1b0b729d27ea2edf367a27a43e33b0
SHA147ce676c0177f29a88d75d3f3f8ebfaa72e4cf62
SHA256fdd60d7c77c525cbd72343b026b2d64f9be5ec8c014c36fd154abb6aa42ddf67
SHA512a13f463e71e738a08ffc4d804408ae75ce3afb30a63cde609de2fd0f8585b93fd20421284f10abd267b2c592875a7a8e1f6712507dbb7ba3a59546cf5c9d5e70
-
Filesize
356B
MD5fa345f0f028f8b90b05240ca29fa869f
SHA1b5cf34cafeb998d22ae33c9490677bbe528c92a4
SHA2560c3cd561ce181a53d2102fb6de848c4d9bad5736a494e0f9c0e5dc81855a176f
SHA5129a74e9e7d932103c143bcb5d79783f499488489904bb8521783341c006a3ee34b47f39d4643ae6c4c57a93c633b2b436212d6c0ef1ed2194a50ac2610e41a82f
-
Filesize
8KB
MD5d1d8b9280625c80f592da2d4c0cdf4ea
SHA1726d1d88947bd3b7d830d3a2943dfd7856919348
SHA25663495ceedc0c7d693c7e9bedc12f1415fe6cfbfd0ab4dfe68a1ed0240f13487b
SHA512a92585f9dad702a1d6817c1615207b7a2d4d1717d23af70674add855912cd5913e491ffa890a1ecbef937cf1cd1f7622fcd84aec58768031411e5f1c83051b6a
-
Filesize
8KB
MD5241b094997751d05c6c0407f77a8cdcb
SHA1637280e40447f56236c6df23cec822d0f56fcda5
SHA256e3e84ae776af7380bb36feb3c302bd9d467e3da42ae05ad838eafc0728ca909e
SHA512a26c5a436b896a0567ae3cfd95b2a2ba7a29996fb2389d3579c5ad0338d1262771a5a56c0223572c5b653346b558711a9bd17531aae6dee42fc3e6456051e876
-
Filesize
8KB
MD5c284ce33e0a7802a9666e594e32dcafe
SHA15d6fb1183f93ba56e7e867f0f0e798c32dd28a20
SHA256d25a5bb5b4e4995940da1924f62aa37a0672795973ed7e3275e0a6cfaac8c489
SHA512817c8f0405a5ca75fe53190b09bbd54c11e2a1e4a297610d7d7e48a34d8e2695cdd0fba12826657fc6fb15a8762b6f9798e1b21697dd47f1160f02ca87f9c6b1
-
Filesize
195KB
MD559ea4b84c44ae07bc0b1cc445a2451a0
SHA1ba76f870d297cadf00d9ea25650851df7b75f70c
SHA256090ea38f4df77cb4227d555a8adedbab572daf9e6f38cce7b3cab4103fd6d437
SHA512b4b4292ce697672834ef2d3fffd023d3c57308f40209815550c4610275378ea794163e372bbda276c016e2c1ef39cbffb542fcfd023d4951ef217035b261ea3e
-
Filesize
195KB
MD562f82a0c5d8c4e5c5355500d778a9155
SHA1f878a3f860da0cfb136ab93c20e2435fdf43b230
SHA256deef81641c7d2d80340e99207bcc73a887002e82226e13327ea76698fd5ede3f
SHA5124d1c3508b9d90f76b40d0d2a392df07b4536f653078f21f1e69c73db205640ce3ed8cf2aee4c9165fa195a1cf16e9740b3389da1370a94ce95c77afabc43ca1b