Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 17:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.usercontent.google.com/download?id=13I0oztxfVw2AJrSZO9-s7pZ9sXYL1JQ2&export=download&confirm=t&uuid=cfe22c8a-0bd7-4191-9897-b2a293eeb314
Resource
win10v2004-20240802-en
General
-
Target
https://drive.usercontent.google.com/download?id=13I0oztxfVw2AJrSZO9-s7pZ9sXYL1JQ2&export=download&confirm=t&uuid=cfe22c8a-0bd7-4191-9897-b2a293eeb314
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 2432 msedge.exe 2432 msedge.exe 4088 msedge.exe 4088 msedge.exe 4720 identity_helper.exe 4720 identity_helper.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe 1976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2984 7zG.exe Token: 35 2984 7zG.exe Token: SeSecurityPrivilege 2984 7zG.exe Token: SeSecurityPrivilege 2984 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2984 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe 2432 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2372 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2328 2432 msedge.exe 84 PID 2432 wrote to memory of 2328 2432 msedge.exe 84 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4452 2432 msedge.exe 85 PID 2432 wrote to memory of 4432 2432 msedge.exe 86 PID 2432 wrote to memory of 4432 2432 msedge.exe 86 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87 PID 2432 wrote to memory of 1108 2432 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.usercontent.google.com/download?id=13I0oztxfVw2AJrSZO9-s7pZ9sXYL1JQ2&export=download&confirm=t&uuid=cfe22c8a-0bd7-4191-9897-b2a293eeb3141⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbda5446f8,0x7ffbda544708,0x7ffbda5447182⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,2430854159854595262,3549642455255167435,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4252
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2372
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4908
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap2366:134:7zEvent21471⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
Filesize
317B
MD554c2437c31249f0a31c1d8c38422aa57
SHA1106c251fdc124d64ec24ab7fa462a28b129bec53
SHA256027fe90dff35d5f15ae9decdf093f9980bc45c085cbbf5a711d8fd93d9df52c2
SHA5129af9c89f1c5e960ffbed8b56492ac43f6af611291680a279420df9afe927368624699a6c2aa9d7b2cd82d2450034a50b32d728331721dfe49f01a8f9196c237e
-
Filesize
5KB
MD594b7ace6c34fbd3ba301c501d42bf051
SHA1fd1c4a549f44184689cf993f10e1f76fa3afc830
SHA25655e0d611d8032dd4ecbc566d5d0679553ceeabe07d48523d14df4b989b548035
SHA512bb72eee18ec552eeaa2cd80c9807ec9adbd831b74688414e3e9b9bd98921e068d0e6783ec3d0609bce3cb070de287a4248f09b2fba7e92bf5985d10875414196
-
Filesize
5KB
MD5e87b37b0976c6d2a1a49871ce1d07871
SHA1e7f04ef7312f29ac2881ec2142f83b34ed8a06d0
SHA256eb6f53db91125cf59429c9e49347a866888fcaf577bdfe8f1fd1328063a8c87b
SHA512ce8c49b67211b26b022429f4988ac1488e5f376ccc66b0c88e8f9f483caca686469d484193b8cf4cbb8c6d187f47752443c8b8326a8033f1c8fc3be3e65ef1e5
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD580fd857ea7063ad84e484abfbd2e3389
SHA16db199be2b767b99399895a8a577dde77a73bf07
SHA256c333715c2accd8f717b640c76bbb139b5b9822b494a2d9abbdcd943e595720a5
SHA512074225ba06071779123e0ae253680186d03266b6446596117d6c18cea76d73fdde973652b729f826793e7ff9e262f96de89a7b7534d2aae1f567d89b1b6014d6
-
Filesize
10KB
MD5e3881973985142b2a0d16b48b5ee253e
SHA16da6d8506d9350096e3acfec9e9a3928adee4ba2
SHA256eb4cf59e8167f2fe7f6f0852c49137824614dc8dfeef8f043392786b6e9c17c3
SHA512e6e6e28bed26e6e3509c412fe03f416c9daf63f7fdf21bfb4464b7bc298f92738365ce872cf5ddd54be80bea4333fc37f500a8527e7d2e22c2eb60ff1f8bedc6
-
Filesize
929KB
MD56d72830a7f0282793821b9cce233de87
SHA1c2e0461aa454282bf2256b6addf317d580bc5293
SHA256fccd9e01d67c207421c520202494a676b5bcedddf30efd3de0bb814b2595bfcb
SHA5125090c8ce51f47c2be7c6dc51a8b9601eb8eb0b0162cac0d2113576e1fd86b04a50f666c512dc8f00058b27f4589880dbf4bdd8dbf3515f44a5d7473a0156ca7a