Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 18:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1FLcefIjue_KNHVDucsU8WMi-aQHFqKQg?usp=drive_link
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/drive/folders/1FLcefIjue_KNHVDucsU8WMi-aQHFqKQg?usp=drive_link
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1108 msedge.exe 1108 msedge.exe 1164 msedge.exe 1164 msedge.exe 5008 identity_helper.exe 5008 identity_helper.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1164 wrote to memory of 824 1164 msedge.exe 83 PID 1164 wrote to memory of 824 1164 msedge.exe 83 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 2380 1164 msedge.exe 84 PID 1164 wrote to memory of 1108 1164 msedge.exe 85 PID 1164 wrote to memory of 1108 1164 msedge.exe 85 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86 PID 1164 wrote to memory of 3444 1164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/drive/folders/1FLcefIjue_KNHVDucsU8WMi-aQHFqKQg?usp=drive_link1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb34246f8,0x7fffb3424708,0x7fffb34247182⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,12242434922659446625,7445204955459090876,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
25KB
MD59222217ea98c35e71acd00dfe056b030
SHA142fc786d7b865bdba84117ff15357fada69d3b35
SHA2561bbd4cf227b3645dccb3d9e3e03736d4e7612326ef09126cf18fccf00b1aac4f
SHA5127aaaa2031579bdbc89a31201613e26f4a1b67998cafc0d2372438beb22f11ba0bcc13d41c6d6e074b3e5a8d87a15dee42747b796c92d619549e83bb117362780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD53e82117fe936451e98bb7129645fe1b6
SHA1a3af799651328d44807927ef13a6695104fd2dbd
SHA256a5c7602f6c1e772017cc9a4f004b7ce9ab4d47fd443eb12ba7c9e2754f750092
SHA51269b4fdc7c621fc8397fbe9a14d55a5c389649def1a1bc217ba6e577eecd306cdc03634760f33881ad463f893ba67b30169c842609eb8f3f657b9e2f67dc113bc
-
Filesize
4KB
MD5859ef9d9c7e93b644502e257b9615dab
SHA1d0d1b38701654a5c4ae8f6361a85849d4621bdb9
SHA256e8ff593d01960854a00fa75a01991d16becbdef8bf95c2f773c90d5bca402c21
SHA5127e9bfff968b995e936333831a29614eaddaecd35b3e9acfab2ceb374c02571d3df91e90bc2f9154b346fdb63197b99f630bc6a3b33b36f516dbf3d64fef7164c
-
Filesize
4KB
MD5525362a37eb69463fc43fe04c2add28f
SHA1368c76a09e4ef93355623be4a94b988b8e0171b1
SHA256fb489cfe966e988738d18f7c6a09ebf4a0ca984d938a6f241e32bd525b667c32
SHA512131d5067b632fa00946d1c19c9005a9237031d2ad6ab260b0b6cdf27dd97bf7054c7ee2fcca118ba5472e8451241ef7766d06ca9329740f5e7c7f02143aeacbf
-
Filesize
5KB
MD58e4be44a65a9fe965ae09aab049caeb0
SHA1cb260057fdc4abfb16fa3423e345d311bc4e18c7
SHA25695855aa543c62ae34baf6024bc03ed1a3d3e099486123d63477f47ca47332beb
SHA51276ef8944c38c2853af20b3772d6cf4f1c349d473e966b30c33e634c8b6346b31533e4d23cc88ba217de8edccfd3a6447c560f8cf9f101eefa80408f93ac69a84
-
Filesize
6KB
MD5c2f82475b8895853f760e4160e8d166c
SHA163e2347e840dd05a0a888de77507ad2820ffd225
SHA2566379df0803e8eedc01fa22a43dcdea6a7bf25b36fb033690bf47ea17327a314a
SHA512b35607c244e53df0c12964a3f5d39c95ed9631b29fa56e35f43b6e31caa5b8d005d1af22bf694ffa362541a0f089bbfb6e693823fc5dc7f94c951e31531f6d29
-
Filesize
1KB
MD5063cdc5166d4c3a180a9dbae256a32a9
SHA180b79d691e22eb24b78eb7710d89aba1ece7150a
SHA256076b6d9e5bc009ca5f2a52f065475cab6ad88bb325d7ef40af2f4e17fb0e8986
SHA512ff16062bae35f8accbd154a0844ca2789de6444b206517cc2edb8776be4ebd8f3a350921de206cd6493c0431813d0c6e902d8e6e4b43ca1b6ab2eccf9ec137d3
-
Filesize
1KB
MD5d52058196cb35d5da976e7565bc25afb
SHA1835828ee8b79abf55f71e70fdbc80fde34b1d8a6
SHA256a42324e86e16631f1d5302603f756312c2fa1e14e932ff7617d743c443743637
SHA51204a981f3d85924b511c3b3cffe8c6a361f868ccc135479d07f5ad365a063d3e55841171f9ab967d7bc1a6e1c997fc9821a5225e2f063e20070d1b88a77c58e81
-
Filesize
1KB
MD5e6a7cf91ae0db5c65f005e47d140b6a7
SHA13b28c2bfd92a7104d436a35634b9958b5263efcb
SHA256a90e06b8851ff6c2b67613ccf4d68d94a1db272ca8fa4f5b9857b43c020af4f7
SHA512af254714940bc3d36735e4b902f754f87961b24d40070a6fd1b06f0e069a4288803f894adb41a3bb398c280cceaa0abbac836408b3ef73f9ea59ea3d502b4bbc
-
Filesize
1KB
MD581c15c85c9ba746494d5bd8c2dd69729
SHA1b88e908ffea264566f97aa5c36c3f37f3f450118
SHA256ce401a50273f8c08df0c60db751cedfb677e7b2cae2321223487ed68521bcf41
SHA512347d265eb7b9e96be94d2b8b933d22db74315589de67053cb1a3a9358ab1f315838f17fa132c0bc36117b693159034ffb5a68bc2f345d9ac38f774f5dd9cde4d
-
Filesize
1KB
MD58374e90482af18187e5fa4e53fbd487d
SHA123446b36ea22bf765f708344ea7a363d761d8857
SHA2567b2fa2538f395b855c314b99ff1bf6759bed0266d625dd9630fb65706bdd314c
SHA5126e61cd5efa61fb44cb4f19f2a500fa672464ae0f4eef077dab02ff261c3c62f41958822d94a03b7b60813873e7d235200ea7c5d85d07c97f15e38d41957d8306
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57925bbd911102a50c1ba79aa02529e6b
SHA14215848b38ea57be99e817b41e71ed91cde0e028
SHA2562801bfda7c37968835fe2482eddc36048e8a1aea1915607d0cec132cebb712aa
SHA51266748df95f4b5f9cec02323f957e7a602bb326971ee742d4fdb9afeccd4b70a747c1104a7b1efd19d9e85418a7387097600631a5b032689d7a6173243806a9fc