Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 09:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1HjDnvcGy1GV2NRkO2OP-Oz_RaoubJWFP/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1HjDnvcGy1GV2NRkO2OP-Oz_RaoubJWFP/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 12 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 325365.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 4196 msedge.exe 4196 msedge.exe 4176 identity_helper.exe 4176 identity_helper.exe 2956 msedge.exe 2956 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1852 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe 1852 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 4108 4196 msedge.exe 82 PID 4196 wrote to memory of 4108 4196 msedge.exe 82 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 1424 4196 msedge.exe 83 PID 4196 wrote to memory of 2208 4196 msedge.exe 84 PID 4196 wrote to memory of 2208 4196 msedge.exe 84 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85 PID 4196 wrote to memory of 392 4196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1HjDnvcGy1GV2NRkO2OP-Oz_RaoubJWFP/view1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd95346f8,0x7ffcd9534708,0x7ffcd95347182⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6328 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2196,761535988002519526,2607389751503328633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1884
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Assembly-CSharp.dll2⤵PID:1884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD58cff08af0e1f7038cd97233da35427bd
SHA1e404c9dafe4543e837f2a910a465fb8d668bda14
SHA2568f474ac0b91cce5deddf3a160078b87e995e2a06ce5546a91282c7797cb05612
SHA512723f3fa3f81cfefae6fcf512d2b2c4ecb474eaf41043e69d0993ef80a2c73000e7b7f613d9b3bfa3d68f1c258cc7b57e2a9130372b9e6522ba740516bd7d63db
-
Filesize
5KB
MD555a6df5366c6709dde59e0e0bd71401b
SHA1b2d20532f3e54d51d54d0e4e043772072f1685cc
SHA256fa26609192cd241c78d312722c44de5eaa19edce61a54af391e5d91a1e2c1190
SHA5120ed79776d2d7806ca05c59ea464faa39dfc3e5675b1b35c5f1fbf4e5fb7c0919063db330c30bb3bab348704ba7b2767640c2bcb7bdf4570fec9c9a65b53b0ed2
-
Filesize
6KB
MD5fcd4a33a7196bcad2ac7f94db1631736
SHA198c9aeb2162e1ffc74699bf55ffb941f0ddcd805
SHA256117923ed69b29ce9f36f173a738b238118ee2e051c418a492e1511ed53259c0c
SHA512fb5e5e6aedc722fe3f6b704ba124eb7ada7cfee678dc58b16ccbaedd964750b8c08a319281dcdef08a127e43ff15d4658c0159b04eef03fddaa386a46a1a9f28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55a3fa84a1e04fb5d4fa1f2dcd3859baf
SHA166d6541737301c9efb719945c7d1288af5925f62
SHA25677c71862422357cfb6453bf4db295776fae46ff301e56f6ae79365a33a363d22
SHA512c8f98b45e79ad8f707782fdade1466e32ff53fa8544854f57027febbfa3bc1e086639d872fcb426595771923da9e6afe6d9301de04defad9484ce3079aadc218
-
Filesize
10KB
MD54e4d7a41461cc0ffb6ba9718d85a96e8
SHA1d408e3f02a8a7cc2438c6763a4474bc638a8e2de
SHA25642d729832bce658b72479940bd824097c93dbd5a90a4a433b0bf666dfc3e0e1c
SHA5124b3ebd72830d81cc35625bdedc3fb85583e1d9ea76dce0cd80124113c90716f925834b30deac7f69395fb98f514103e85161567c1af23b5d31caee8ed7a39235
-
Filesize
2.1MB
MD5c569469c2fd30fe1e54304e84eeefda6
SHA11ff9bc5a7516ba7f4930c56721e0ab98dc65dfca
SHA2562dbf1e623246615fb14fd4ba20f875a3663e800f4f110b2e5146cc25474c55e5
SHA5122f828df82ba9d968e8a297002f0ba10b628160d4471522451d419d175c5fce3252affd5ce1d193348180dcf5bd3a621c8ff582fccfc940701c33a6bdbc092273