Analysis
-
max time kernel
82s -
max time network
75s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-11-2024 14:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1N3Yz9U2NGlIEwiR7jz6oGzITBHU32kv9/view?usp=sharing
Resource
win10ltsc2021-20241023-en
General
-
Target
https://drive.google.com/file/d/1N3Yz9U2NGlIEwiR7jz6oGzITBHU32kv9/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 drive.google.com 9 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133757221137347274" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe Token: SeShutdownPrivilege 3900 chrome.exe Token: SeCreatePagefilePrivilege 3900 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 1920 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe 3900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3900 wrote to memory of 5068 3900 chrome.exe 82 PID 3900 wrote to memory of 5068 3900 chrome.exe 82 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5052 3900 chrome.exe 83 PID 3900 wrote to memory of 5092 3900 chrome.exe 84 PID 3900 wrote to memory of 5092 3900 chrome.exe 84 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 PID 3900 wrote to memory of 928 3900 chrome.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1N3Yz9U2NGlIEwiR7jz6oGzITBHU32kv9/view?usp=sharing1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffbdb7acc40,0x7ffbdb7acc4c,0x7ffbdb7acc582⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2064,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=4776 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4816,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5552,i,8851671275071862048,1078238046990152609,262144 --variations-seed-version=20241022-180310.361000 --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:396
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1304
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\osamason---flex-musix-drum-kit\" -spe -an -ai#7zMap4999:122:7zEvent126351⤵
- Suspicious use of FindShellTrayWindow
PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5407ae5a888ce4828972b2a3eff212a27
SHA1aab473110901fbd2ced1d3f15bf81f2951c25dbf
SHA25609b76f082f00838575e57a40ae602890b20454531067552657c3d0f4a5105631
SHA512762d58b78558af9ad59927fa66f75d4e59ff76355f5242f15770128edcc590a590023dce8c8fb0a47f2304fa1c7023822b3936fa3758574e5ec106830c018eac
-
Filesize
408B
MD5b3a0fa69616322644b1612fd55f38ceb
SHA15be7710a030a0672c07006db7c5b2f2a08a8b66a
SHA256b0251ae38c5a8716ce34103062d34b0575615bb44a2e7aca7a35b390aaaf8f8d
SHA512c6eb8b8b106b200caaf02728429379d1515b3ef04d5ab46d89db94cac1b77ef03c9b93dcc620a0fb414e02cddaea0ea47f69e8ba0311d47eb6fde5c6ef9d05be
-
Filesize
6KB
MD53756faf8e12f24967590627179e22d88
SHA160bda647675004acebbcdd3c96a17fb786544d8f
SHA2561acd72a606ff640b8e7395f50790431afbe088d431889a9987a5a552540dffbe
SHA512794393066a18b8da67d6cb2d0073010219ad581555ce0058f404a7eb481196028aa8fbcf6c20d248ea132e3eac821f75c21fc92298a848b277ff7d575e7fe7a0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD573157337de8b3b7648a3e57c71c56f30
SHA1033897d1f7e77da21ad5d7cf234834761456160a
SHA2561b17bed16cb87b84d9e3f4cf1a6ae9e56163d278db6fa1613981420cd69abe0a
SHA512c39faaf56130bab8a4088f2ed5ae6b3a9e9ac4dd1fb78de49bc1c4d4f6ebbd302bb343dda257363c2450ba04350c5aa3e182144ae637c0be9815a978ac181400
-
Filesize
9KB
MD58f8fefc9fd793e050226cd4ed060fcf3
SHA17cb504e6bc6cbdb7f9094e64a683b772d030a315
SHA2567faa36a2149814a960b78dd3d0b571bf49290e7aa3ba74f9c51d56a52e870291
SHA51287be51ebf8b5aaf0ca4b6e311d8b4d28a59ca0240171facec701f81611a72611496120edb4dc12def2a6624e377c1aa1a6de58a7d1dd143d7cb3261882b66124
-
Filesize
9KB
MD5cea4d2f998155da8acf129442f519269
SHA10d95ca769ac120169dd5530ca3a63e0a1bd54eaf
SHA2568463288fef9005bcb2fac373580e328e57aff7e743b74197deeaaf30fdf9ec11
SHA5129540f177b3f24f5f615d5cd1410ae11dd0bdcb0e1f2a27cadd6f69a143fe4627286376a32d2811697f63a341bc8edcf59535704af843a9855c93587f433a7ac3
-
Filesize
9KB
MD5e245c1db1670902419cc985183829b94
SHA1f0270592e97802139e4d52b594266147ac9af975
SHA256d8182b7c610cefa0837a4ab5cf10a55f30e8588819d22105a84a8ac95b2a990e
SHA512bc6001ebcab8312c56c0d2de157af17110789d36dc88e3b35d4dbb44ff941d4a9d754b14e4ab5ac5cb6be83aa7b22ede88ecb20b17c3656f05b93971b6ec038d
-
Filesize
10KB
MD5213cafbafd7a20ed644d919218470dd1
SHA142525c76e2c80e77c31f76e56f4c0e59c0614f54
SHA25626b5f1a0ecf4d5f994e1ac3d6dd6f333f3dcaaa99ec22537205ca926a3e29b9d
SHA5124710208209b9e84eb682b58a1449c0061e80813177a990e3ad182ba0538073e18051c247b8d3394907c1e1a6da1479a887460ed8910b1005febd4f56fa6e5af9
-
Filesize
9KB
MD50b36f3e1e8f26ae8adfe655ad42c4a5f
SHA1cbbea90dfe364090360dc222b4dfd702525eeabc
SHA2562b2cbf4aedaf0d6871e369cf212bb7cf8f3eaf9847880f7b0a5b55f22f7546df
SHA512007266937195c495dd2670fa71fa3b6d45491e851583a1da48851c09c261cab842235022288ec34e7e3a97921eb5619d21bb8b9bf12c9b91cc0cd44efbb2d156
-
Filesize
118KB
MD540c46677d76a0213b9963d49367c39c1
SHA14825c4c337c01545a6860d63329106370e720e03
SHA2568b9a7f159efb0d3fe2ee93e0e4b5c012d20c49164592483a2cda92df33193332
SHA512c32859764f2c5bcd11c4ed3f41bb70996e5d2d440e9a8205bd59dbdfdd144834af44bef063a4897f649f5e627dd7c2ebfbdcce651456fd313649ce6a42176581
-
Filesize
118KB
MD57fcd66d58a1b65f311e74a19c968f58d
SHA12bc57f7afe55a4d3633352f62ecead5e29522a5a
SHA256dd72179c9431da0c2626236f88432755485816cdf8ec30f5491062ef3a7c1d76
SHA512f4432c8d08235c68786769879099b1362a3735a28c60add4bd9d43d910e093eb3b48abd84366f359570885df165dce5f4a16516d4ead12b06dd63530f5488c23
-
Filesize
118KB
MD5f0163d84c629ed25ef833af41a20235c
SHA1ffdb8940a31b68b48111ca6831c42a2d7cc1092f
SHA256564f4c282fa862b24ae18e0bc84fe80036318e2fe3cfdea7771167dd7c304a78
SHA512d59dbdb7d97c7466265ced28c96fb2255fe16f843809b44ea68c8d93d9f4c73faa38af39497fa66ef59081dd8edbd110677c172ac8f82a0940850f3a6e98f932
-
C:\Users\Admin\Downloads\osamason---flex-musix-drum-kit\! FLEX MUSIX DRUM KIT - ARTIFICIAL\№1 FLEX MUSIX DRUM KIT - ARTIFICIAL\Clap.nfo
Filesize40B
MD565dad8f8148d56608492e83a6075be2a
SHA11fccf00b5db1126635f941b72c021fd618e85083
SHA2567f8ab9628cdea1d723a198b57257d7b253ef94f438f8177ecb4129febf4832db
SHA512ddfb9befa0a9e612ebd121a2db7136f03308302d6f4afbd5aedf30625948f730afb89bdae234d019dc694b7418c1931d0e554b8df39194d94202392c025065ab
-
C:\Users\Admin\Downloads\osamason---flex-musix-drum-kit\! FLEX MUSIX DRUM KIT - ARTIFICIAL\№2 FLEX MUSIX DECONSTRUCTED KIT - ARTIFICIAL\№11 Kome Thru\MIDI.nfo
Filesize50B
MD5d49a847a6ce99c868e483fc050bf3556
SHA1f3f57ff2810f09d9fc2cc81081d7884c0386d27f
SHA2566800089c1947f340741f69b96ce5052b594d0beb777791a76559406dc1e34032
SHA512fa516d238e1b4cabe7c824fe010d7c7ac5685c4bbcb2f92cd231564bf3f2aee78d2617430806119e3f82c2158518c698fc5e255679206cb24417ce32206c24ef
-
C:\Users\Admin\Downloads\osamason---flex-musix-drum-kit\! FLEX MUSIX DRUM KIT - ARTIFICIAL\№2 FLEX MUSIX DECONSTRUCTED KIT - ARTIFICIAL\№4 For Da Flex\For Da Flex Clap.wav
Filesize65KB
MD5c8a5d33f2618b4da68c89b483c7d9fcf
SHA19464fa3d6d347e57d03f71b8d325937c4af5e7fd
SHA256c6a369e3797186f40dbf8981b347df7dffa527975d062f3bb48b3880fd1a4dbf
SHA512084c36d286a52e764367d76e9cd3677d50b9e35683cf40cb5bf7cb9e09ae925ba130d32072e6e7105cc9b1fc3ee31783d174eb9286acc9497f8ddb7f08df7623
-
C:\Users\Admin\Downloads\osamason---flex-musix-drum-kit\! FLEX MUSIX DRUM KIT - ARTIFICIAL\№2 FLEX MUSIX DECONSTRUCTED KIT - ARTIFICIAL\№4 For Da Flex\For Da Flex Hi Hat.wav
Filesize20KB
MD5f68b40da0dff06d17922e04d28386a22
SHA17f41f5dff2b9b65db24f6ac0bdac66e8d0d450bc
SHA2560fb70d1e10fde16a7ff4ac9f1512e0c7cfede17aef897ed39b9545a2091bc878
SHA512d99656d53ed613c6edc9ddd14b079602bf1b7c63d463989d9d84cd741987351e21ac4a0ec2dd3c54d020c4dd59d70769c9a754fb6dab7e7db1fd83cfefa55de2
-
C:\Users\Admin\Downloads\osamason---flex-musix-drum-kit\! FLEX MUSIX DRUM KIT - ARTIFICIAL\№2 FLEX MUSIX DECONSTRUCTED KIT - ARTIFICIAL\№4 For Da Flex\For Da Flex Open Hat.wav
Filesize170KB
MD5267e8a1a482c77676c26ac002043efc3
SHA1d630bebd70ecdbe89c019abfab2e18976c67068d
SHA2560475ad59a1868bde2793febc233ce7c7e9716a7eaca37d8ac006699ec6e28821
SHA512e6e34285d0749fa9a2ae09668902b2c3c3da78933ddb740a1c978e4c626801676cb5e41d08d8f9de22e4713a9ea475c68e7ddca75aaa30c8fbe52fe49d5d781e