Analysis
-
max time kernel
48s -
max time network
47s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-09-2024 16:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1280210557395533904/1280210557613506733/AmIDetected.exe?ex=66d7e93e&is=66d697be&hm=5edb846b1bbabc3c7945a9f8fc8191feed62df7732400fd15c824e3d5013ea16&
Resource
win11-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1280210557395533904/1280210557613506733/AmIDetected.exe?ex=66d7e93e&is=66d697be&hm=5edb846b1bbabc3c7945a9f8fc8191feed62df7732400fd15c824e3d5013ea16&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2708 AmIDetected.exe 2800 AmIDetected.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\AmIDetected.exe:Zone.Identifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 903962.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\AmIDetected.exe:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 408 msedge.exe 408 msedge.exe 2736 msedge.exe 2736 msedge.exe 4888 msedge.exe 4888 msedge.exe 4640 msedge.exe 4640 msedge.exe 4808 identity_helper.exe 4808 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 4724 2736 msedge.exe 80 PID 2736 wrote to memory of 4724 2736 msedge.exe 80 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 1048 2736 msedge.exe 81 PID 2736 wrote to memory of 408 2736 msedge.exe 82 PID 2736 wrote to memory of 408 2736 msedge.exe 82 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83 PID 2736 wrote to memory of 4880 2736 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1280210557395533904/1280210557613506733/AmIDetected.exe?ex=66d7e93e&is=66d697be&hm=5edb846b1bbabc3c7945a9f8fc8191feed62df7732400fd15c824e3d5013ea16&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd86ea3cb8,0x7ffd86ea3cc8,0x7ffd86ea3cd82⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Users\Admin\Downloads\AmIDetected.exe"C:\Users\Admin\Downloads\AmIDetected.exe"2⤵
- Executes dropped EXE
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,13149149773587333057,18108965958735429976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4120
-
-
C:\Users\Admin\Downloads\AmIDetected.exe"C:\Users\Admin\Downloads\AmIDetected.exe"2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
Filesize
5KB
MD5d3953eaa44f520f9690eacaf64c277d4
SHA1b078b3da973c7e77dbbd2306d211ab4aba519e3a
SHA256b57d871845cf9e7683dc5804e46c7ecb7b1b7cc371e151d557bd4b325daa3e20
SHA5122a8d0f7ad528af257c42d3e623ab0dd5909d0fcd0a1876d0a1a51396bdecf6e310a1821c362f0588dac0571e1bd0476558360a1e89d544e16d038a6711174bb2
-
Filesize
5KB
MD59fb1822a14e87e4e7402ddb5a811a893
SHA12be44ee7ee6e2bc7c3643d7ef83c5164ba9a7ac2
SHA2564d3fe83b170c34f682773c92e21e7497be3672fb23a032806390048b4bd28dca
SHA512c2eb55f91b4113716deb42d0681184467c504603a065753523889d6941d98cffae34fc74127509613ba7da6c71b07a6a20abcacd860f2d48f52ed3648d9e34cb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD544727755c2894652905cb3ece9487df7
SHA14121de2cf02c62788edef0e8bf0d27228ad74124
SHA256a0989390cc22361112701c1ea29223007f33bba974e13c25fcbb7f61f92e8320
SHA5127a7e214dcb0e9bdecc445fb08f1ce46063d8df529edb5cd96ff3903baac6a850cb5ccebce905312db01abc270353eed49befa37c1ae3248b7eb5e9db9579775b
-
Filesize
10KB
MD58daaa55395940393bec4bbe81d7bb5cb
SHA1488a2440da913597a8c462988f1204e51ae8f26c
SHA256561955e31a300b2f9c5f18c8eb6602b9377282c0dddcffaff68a7b9438de5689
SHA512c8b1ca41115b27cd09fc05e5c1a2b3f3fa5154ea7317334025ac7ed96515202984b30cb349d04e565fb5d99f52608c777db6c4dfb9f86e80c8b9023651894f1b
-
Filesize
10KB
MD58a69045f7b0d196da62b29f5166d9cf4
SHA1d0352a757a93655c8e1e7676657c7daa54e9e2fc
SHA256dfeaa0497738789f55ef45b1e8d6a86fec1e3665373a86e0c5af5a9a7d3ca87b
SHA512a93506c2652487619dc1d7d8870e8bdcdb66b7ffae8b4a663d81ee93933d5b5f5fb86aee8121491ae5d7b3edecf712863612f761bcffa9e4ab7678128edc741f
-
Filesize
10KB
MD5fea8004f03e95fd7f2da70e00d55fe44
SHA1415603831aa44800fa84c4d8a1b435c3c6972cba
SHA25687bb3a439d43e0f4d1999ff45613b6f762274d56e99330940328e84b5c5217cc
SHA512419c8d2d9485a548a9d1031986ef293d59837236009aff7baffb741392b74a222bc02f5a5e9b54ec9fd856d53fa5da040e348c414c5a4497d42345be5230434a
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
335KB
MD5077c61638e09d1d6a532529cac48bad9
SHA167fc96c88435cf44545a031b9e5b8b9f697eeeff
SHA25656bf4eb1645d3749bb2e5b616b989c8518cc9b1ea3189acf00c17f6dff5b5648
SHA5125b7f10d787fa0fe546fc45fc085764f0806e694fa96525d3e0076b0f827c28c649a5ac90f255cab3b23b59f2fbc6421419aa96c747abdc8a420b1583a9bb1ae3