Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 00:48
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771420969154951" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe Token: SeShutdownPrivilege 4768 chrome.exe Token: SeCreatePagefilePrivilege 4768 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe 4768 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3228 4768 chrome.exe 82 PID 4768 wrote to memory of 3228 4768 chrome.exe 82 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2488 4768 chrome.exe 83 PID 4768 wrote to memory of 2896 4768 chrome.exe 84 PID 4768 wrote to memory of 2896 4768 chrome.exe 84 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85 PID 4768 wrote to memory of 3112 4768 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://0416c34.netsolhost.com/microsoft-outlook/app/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xf8,0x108,0x7ff829c4cc40,0x7ff829c4cc4c,0x7ff829c4cc582⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4520,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4652 /prefetch:82⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4680,i,444153579861217940,2947920099772702623,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c7a5b68bc84fb15d390d14f7d685efbf
SHA180c8aeef0a886b964a07f49121ae8b6bdfd3d723
SHA2566743b4bc1cfad4b80eb22ca6231f2acf7671a32bc07d17b9b74334a37184d82b
SHA5129c87ae55ba4adef0bc97d05f29b2605f9c3d8a6d3d8d2ecb3698661a1ae4e60ed04b1ed209d84d791277dc7d61ebf16d73cd16b8c100188af3861f38ea1bc911
-
Filesize
1KB
MD5ca4b44f60d0aec23a20ebf1ba7badf6a
SHA143af15b67f1ffa63de13bcb66965e9b37e1222ed
SHA256e8ab624ff96fb3b8e6d77e6166a8c924d18d5f3a42e7bf641060f04d1c8bdb50
SHA51248b57ed66755f9d4eb6f8faaafb011d149d4424effb04c85cb66b083fdd70a094c840f7ff704027f2e40733f1be57d195481338dee5b93afd2c49819665bfbe7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD56e13282cb0760e15c5b1bae138846595
SHA1b026d7e8c6c260ea0806993554904fe230abfabe
SHA2562ef9046105b603089cb92c2fa0d4b9b68131deac1c1253271b39e555176301bf
SHA51284c695c37787f92fd69eb1f8488a7a44ac357f537700f797543a42786d0556f96bfd9530dc784b457d71c5b01093837fa798127f61a0c7ac4b99bc8b7984f5fc
-
Filesize
9KB
MD592cf21b992e79f3bdb23dcf45e05db5d
SHA1583f9fa87e0064d16ace76134168b2b8a8c35ffe
SHA25677d099af6e858887570661f0fd9ba739bb3ec578308073a334a5902bf2cbe10d
SHA5125bb1663cf8a0090a10bfd39e6b96e7dec1c8e5ba1b32136e539c29bf7a5a357f4ba4c3921b7eb96643d7113569c5e223ef85310c6f012366cfa0f7b8bdbe03f5
-
Filesize
9KB
MD56a5fed717efd672bd76e8756eb440731
SHA1f0af130f4e72bb916edd9e669d12254b97f8cf5e
SHA2561f5749bba2dfc1ec1814d6f6d55aa28577890e86ee96cf3c8744db04cae87202
SHA51213b0de2afda5899e3a8697c8d2f63e07c4e994dbc29809f8a70182b1cb1ee1ea48c523246fc3f091390dd913458577942a638c15945837a24e96421831b932dc
-
Filesize
9KB
MD5d43b9f5438aa989246cc735ff0e5e51a
SHA10624425ef43e73a7bafbd9a8878e5263658dd419
SHA2560e57ff2b5d8780bff081b7fe2f6ffd51ccfcc20d51869763fb3da223a4369c60
SHA512e64f3d1272776b57b2fdcdbe1054af82b33e9da1ee848a6017a77f99c0e4d05e7647a8935170b69862e479252f90fe493f59d37f44bc6c10b39fa47f3b06d11a
-
Filesize
9KB
MD50b1bd3852a0c94ce0ff20f3f12b8ed46
SHA1f8b6e64d21ead6c15873ed3aa2ebf24adef33d81
SHA256fad7adadd8f0621ebd5d3c4021931af2377ad19bff2bf6fc6bd1c7ae80dd3824
SHA51225f788e62428f24e85aafde0c8dd1fa7911211740e54ecd1464ccdd8d170cd9bbe88e28e4dca161b58c182cb62a7d0505fd2ed8157ab11d279d5cd393b5be97b
-
Filesize
9KB
MD5d0707fae8f4fee393de1daa747e7a62c
SHA1a1814b108336b52b01ef56d07ab5ea535f1272e2
SHA25612fc5d8323c0a2651cebb30c0ba9f1b440b882800f5fb9f8d33e0a1620e60878
SHA512b857350c38f3064500226c8c437c216acb52531d6a92d97cd64a6d658b5a11056ef5ec3aa4649321e3e77a55839293f0a6d2f9c9933c96e4c4a64a1b1414e1cb
-
Filesize
9KB
MD5c2715be7225189d430367b499fcb0130
SHA12a3b67363b5de7f1178eb42bb85efb78b68515ce
SHA256153ca16f6303063e859d312583396439529c3deba6c062e71af6a20cf597add5
SHA51253e217ad90bc495d6e6c0d14edf6317b9f6e2d3a22fc79ce0313a2ede559929a9db3b32d53eb29512a5f6940a6592663daab388b80f3b9b83a51124287dd0ac6
-
Filesize
9KB
MD5c1b0175d0b2ad5f21be21ab74dd4e50e
SHA13c24e8dc3ae517ff705b7ca943e03a471f2670e3
SHA25625fdc050643e00db2f757ea3802f2a8df68ae4bfa871a5138a6af7e340164aa2
SHA512b8d234af8728d586387e882f0782e792bd4d59678cdbe42d4e4798b5eb7f1e809c61693f0d6ee18d9953c57abee56b7de0c57a488cd70ecf1ddc45b0a71fd34c
-
Filesize
9KB
MD54160772462da3ef6856407ccaa0e404f
SHA14a135f38d684e081d5e03b0594af193de4be4bb3
SHA2566975af0f44a9354bb3a74ddab7b5904134697b9dc6527bb42f2ac2973440c831
SHA512b13daac1b7fda5af68de8468cdfb81e13678f764dc8be435c8302bd14bad76f4bea5eb3d889f5deb0c8b5d1c427aed8439aa0b806cea6e025ae1ae61de22a871
-
Filesize
9KB
MD5f9e760ca91c42d420dc238a77bd58182
SHA124dcfbe380d1ea129ed22e033201f450efe5d1b5
SHA256ac281fce170a9060088a7ecb51fa51f5414338274622fe75cadd25d7c6bab4ea
SHA512252d83a38e4f3c1a714d4f3bd12a4969743aebc36081f2b9772c29fe9768514a746cad42ecbfea66d9b3a130ebb4f233c0c96c49b820fe356e934bf81070303c
-
Filesize
116KB
MD50da0d3cd62f431390ab6153eb5d9d825
SHA1c30398bb680c45b14dd30728fe69fdf5da106065
SHA256859cbbc0e00f26b86f030ee8269bdd34b169618025664928378661bffb9196a2
SHA512fb49af940bcfdb7f47cf6f692b9fd92ec2dc9848905b8e54ab2914924048ad2f5b3114090570809b7965949d11496d4347e9fd589f7862140e089eecf73a0e19
-
Filesize
116KB
MD52ca85800fd1db0fc3221d789f2ce42ea
SHA15567d374189c0c1e8049e47718dbb595076d5bf4
SHA256ba322dc6d9a6634184f35b692b5a204b298722a0eb8a8c9c097afe946c49b650
SHA51237e3c6dac692deb3da89e25fbefdfd6a834ba191e46ddfea6361b7db622de613fd927fdf56e16ce7ffec8682e675f37a8024c03b2d977045d65d47b0595eb696