Analysis
-
max time kernel
72s -
max time network
74s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-10-2024 07:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1KFMR3hb_4mGCMSkQqRVKbqJTeQqgwy-0
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1KFMR3hb_4mGCMSkQqRVKbqJTeQqgwy-0
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133745741813375703" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe Token: SeShutdownPrivilege 4820 chrome.exe Token: SeCreatePagefilePrivilege 4820 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe 4820 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 1348 4820 chrome.exe 77 PID 4820 wrote to memory of 1348 4820 chrome.exe 77 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1296 4820 chrome.exe 78 PID 4820 wrote to memory of 1572 4820 chrome.exe 79 PID 4820 wrote to memory of 1572 4820 chrome.exe 79 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80 PID 4820 wrote to memory of 3456 4820 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/folders/1KFMR3hb_4mGCMSkQqRVKbqJTeQqgwy-01⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda8f0cc40,0x7ffda8f0cc4c,0x7ffda8f0cc582⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1700,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1676 /prefetch:22⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:1572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1708,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4296,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5040,i,5375395525995882342,17523063096812711732,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4432 /prefetch:82⤵
- Modifies registry class
PID:724
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD570a22d41112bd3d83595fc69e8175fdf
SHA1da6ec361e6d8df9271b2f026a4c70b4bfcd6dc96
SHA25606ccc60d6be7212bde873fb3cef0bfa1df80ceb034799cddc293c888a836b812
SHA512e06d81dc3277812ab12e047cd76b19cb76178cb6bac40f9333b6cca0196c73b5302abf42abce48be1a2394a87caa0226918b4c939e7d2b907e69533b4d93d0ac
-
Filesize
912B
MD5733de7ca1fc14b40054a85e509e2457d
SHA13a15c75fce96330023d26a973b3f659c508881fc
SHA2569289d644687bf6f58e77af6be708267ce86554ba669d53ffce5eb192d8dd8915
SHA512b814e32fe42216a0b4b2bab05ecb72bf4969e800e7d521fbef60dbb5e9940f510f56438d05d9e26878bf97a41ecb54661d76f427f04e9b1947ea2bb50593be38
-
Filesize
1KB
MD5b90bdc24630105605c0458cddcdee3e3
SHA198f64001c3bbc9607ed1bb2a1ddafb51e7291ea6
SHA2567bfcf168dd0f4f70fc098d20aafa535a6da2930c75f32733a989fde8de81566d
SHA5124e41f8dcd1df89b946deb49f61e6497a5e0acffefaba16a11af60eea6253c9edbda5e0f920d1f371c9b471df5791a72eca22727d41d82852d291d260f02873d5
-
Filesize
6KB
MD5d5d648a55ab0c0f62383d2be1b11defd
SHA13289f68ef227b30559d34aee07c31ddf9a058250
SHA256c5e75619379e1e2bdac80379dcf5a02aeb3c5c76f45e3ed0aa7592617ca295b8
SHA5122d002ff4916996e3a6b9128b6f1b7779a15ca2bf8c618418a16d438cb1c6301da7bba2afa569401c98acff613d693986d3dc2313ade0816af4a7c4957d3e72a4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD524463aa3d1c764b6c8b396222cb490ec
SHA1b49dc80cb638fd2d6693ee353920be830604300e
SHA256d431b5483868321ec43bac0b920dd08332c489ff6136295af9beb5a9a07e80f9
SHA512d558962629329d0008840eac0be64696747e5ea0c78078af6b55c8366cbd5f6225da59eda6491ab6c46797dee3fc111c35aee1538b7118fe797c9e1d7af1e673
-
Filesize
1KB
MD556dd5692f0e47c60c9e01fb39316d0fc
SHA1aaa2849b288563a6e68e318f1468f2a8524d2a57
SHA25699c6ab4113881b259d6d0878099f08eef61db40eaa13a0d276c431f20625ba46
SHA512f5bc04287cbb1b9787088721e3bc4830402918e671489fc345ae30def9b5f2a7374b6bdb21cfb3ddbc291a3b4974053be0ed2633620cd8c6223571cc35ab5f94
-
Filesize
9KB
MD50f1a06f530d680b86e481a50400152e2
SHA193100a7b65513d82d1ac1dedea7d28aae92440d1
SHA2561e107bd5c6a1fa30576c84fc5ec9d4d91883789fe73e889f30ec2f43aef9ecc1
SHA512133ffd474a9a733dcb15727cdb8984f7d6a99bedba60193bd1fad7b95bd8579e9c4ea79e3838119dcf44e22eff06aa5495f543c53aa8f6560d76250fe9e21bbe
-
Filesize
9KB
MD544694c349acfcb725dcc74893709681d
SHA1448128d604901d48d96cd67f43697a94b91005de
SHA25673a8398e45dd4d7098e5a265d101b63820c10ce86fea3b7fa68c40d86e2bef7d
SHA512e614b52518c27ae3cdc2c3ac65f12d98da77f76a5ea03d32c38c368158c6bde815db9d7f8cf2599bac0b24ac9a896018300b9d6607d5e9db41f855208b42d0e9
-
Filesize
9KB
MD5de450be67c9de379173f7552bf3c4713
SHA1c3bf77d3d8d0c7eeafa0846d9bb822c04c409eb1
SHA256e65bf59597b8b583b8f032e810782f7bb6d9b267bee7cf73be2ad826be7bf592
SHA512037b57f0a2d15b5fee92dfaa6e740d658095b0830ed5fc4ba28acfc25e972e05cc20f0cabff2ae363cdf3d84edee2d1a3b4dd6568172fd7a8c3a06aa9346b50c
-
Filesize
9KB
MD5d8d632e948fc09db5d8a17f7159d50ca
SHA1286c8d22fdfe768429830cf26370b798bb84bdc1
SHA25637fea91290046a38514580e20e5dfa34b90bc2e381b809e0668eb1ade68d981e
SHA5121898a0c27922f27e4c67f42cad45f7b04dcd60e2303405527d963994ac5389381387c6ded0f1f50e83977fdb49929b13e6e8777731af46f086d5a54643f9f10c
-
Filesize
10KB
MD51a64e68f3ecb3f95b55b6bd54020572c
SHA1470d792874c24b85c05b4fc8ddc7a5d168ec010a
SHA256507526285d508315c22097d90403f75df8a867720a3a1d095284a2035132375e
SHA5121f58cf8c581fb93d1bd732a1d13a75c3e5ed1715c0cf2896819366fdb7c7eb8729c6bff19406d7412699a25e2b85817a487428530acc22653de73990a2c8e842
-
Filesize
228KB
MD5e5a239137efd97a8bf86c35c965f6c89
SHA1338f2c2e7e0725b4b6d76247db100b06bcc43067
SHA256c2658911abcd821c8f07834645a2f332f308aafe44318443427f90f636bde76b
SHA512925b4246d904da8f57de0d7c43534a042d0eb317d5361c2d8c62f552162c053ec26bfadb080a6a770358e9bca565ebcf454c076b4e64cbd61a00d5944ffc376c
-
Filesize
228KB
MD56756e6d166b6f20951d11e4d610a34ba
SHA12a7a67de8a844adb3e2c797a3fb90bc0895d0642
SHA2563523b8448e860b9907450793f5bdddfec3b2b6c91b3bc0d149379bbe51f21aeb
SHA512b08edcadc1e4458e7b40701816bb2dd38d3bbee22ce0e63c0a6210125f58d9e75ad9cdfcea9223eec2ddf5313e815d501a6f1cea13c0827a44e6c6304614758b