Analysis
-
max time kernel
54s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1-h-f8n3A62SKDsWlsujTc_3w0dtTWREx/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1-h-f8n3A62SKDsWlsujTc_3w0dtTWREx/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 drive.google.com 9 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133783318654173579" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe Token: SeShutdownPrivilege 1696 chrome.exe Token: SeCreatePagefilePrivilege 1696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe 1696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 4108 1696 chrome.exe 83 PID 1696 wrote to memory of 4108 1696 chrome.exe 83 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 544 1696 chrome.exe 84 PID 1696 wrote to memory of 3988 1696 chrome.exe 85 PID 1696 wrote to memory of 3988 1696 chrome.exe 85 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86 PID 1696 wrote to memory of 1912 1696 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1-h-f8n3A62SKDsWlsujTc_3w0dtTWREx/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd3e7ecc40,0x7ffd3e7ecc4c,0x7ffd3e7ecc582⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1880,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2004,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5056,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5144,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5184,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5328,i,17438453650210343951,15388825416804376909,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ba544c0759b204630b25b2b14fecfa29
SHA1bb2c952a21b3e2f239d6608d5899642200ed5155
SHA2566106d5f8e342a1950479f208e70f3f56baffa2d899a24b2982e909c2350c819a
SHA512947ce8edb540dc2c584ccb489caee9bb49758169aab5412dc020b753d5a1362a2314a785e6f4e7b71f1fe457c7f2340f0b556483bb441bc273fcf9eeaae5ffdf
-
Filesize
600B
MD502eba9fd453070a730545b31aa53c352
SHA1e60c46e1fe20b9c2351cc46b59266c53e2a8c2fd
SHA256509f1121c92de9ca7e6208c081bf8d754c526535e306a8e6ee9025e806c58ed1
SHA512220d7d389c36d8e84cf60b2aa1e58d8b87c163668fac29c48a06e4e3578d3ce4551057c3bec2b49b956e9f57b4cebfc87ecf0a5f77a1aedc0385848de10977ab
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
851B
MD5e375e4314b5ef924e61e4f1b9b547b6d
SHA18e7bd18b0bbdf70463c6a6715cb7336d3a49bc47
SHA256059588ea644c678cc9df71a40ae4590e09e6f9e6f8ad4d41367a9d5a128defdb
SHA512ac5b97d35d19ec8a72317d2fa9685ecd08bc2753a2f73d2217daeb13f513c775427c40598feee8336cb8c32f65a81c01264dbd7f139a518afac9f30347d0081c
-
Filesize
1KB
MD580cdafe8e352cf6459c8efb986e17e7d
SHA17eca152e8de404c46e2e96517f7d1d219e679f17
SHA2565ea8e1a0f69aac3ed9c01a800dcc3b0d6dd439af8d8a5c072bc32e83ca08e449
SHA512389599ad86e6ca7b02ee5726321f0c0d31c0ae9e37e1840d17c492d75ef896dc0b8fde48758adeadac91f32bd7d0f63638ca7a0b353d6ba12cba224304ad3fe6
-
Filesize
1014B
MD568e85ae191bf4599ef61a1b264bb7edb
SHA1690cd7c0b1d78152d8c949f3d8f90388e0564b89
SHA25600299f1af606834e3da8a13657e00c38851bd15f1f598ffcbdf7d4db524ebea0
SHA512b59eafd1450b24fc952943d7be506dc2769889b74be16554fad27e13cfc9d6bf989754f455a1f07c84b896dadddb0b73bf29bc97bd197842b1e9a7a166dec276
-
Filesize
10KB
MD5d8ae3e6b8ae6ec75db1781e10f7fd694
SHA1675f122f9258f546521e6e42bf86d9daa5a093e1
SHA25627329dac114949a2414477e6e47dadbd4d5e2703378620e475ece33c4efc9c5c
SHA512a4b42d20a7a26dfc78bf6594d2f85eba83056da0faffbe9457b444cad9c296f702e2226488777d755711a6330df3d0636c5a3bd3047fd18d9432e71c8cd8ad85
-
Filesize
10KB
MD5f287398aa9ecd161e6f54bd943ea181d
SHA10d7b8e3e225ddf251f4dadc53a98184e7aedc63b
SHA2563587fd6c1b732e7673b07cd097553c6919e560d15b8eac5e52e4c30369103beb
SHA512ec99afb1489bdb0161fa5a790979ae6423fb04fa4d3eda63d3beb9d3c82f3831457c05131b95c3d95d6871a96cc11728518b04c1e87232574398f2079d4d84b1
-
Filesize
9KB
MD57998de2b4ed43c51a8980671efbc3a57
SHA14395cba1ee36f32ca78ba8390c67be2a9ea6c24b
SHA2563bd5d58f459dc2a537193e23b9718b012d9447db3c43ff2815cf9d584bb30a50
SHA51276b194e48ba04bd1cece090b73c4ee56f30f7e91073fa9f3c911c95e8abdaa6b2db9a8e397eceaf84cfd74176284382e4ed9e621b5eff69b5597b58aa7a9cadf
-
Filesize
116KB
MD51a32ec2da9f0d8d4ac57b9986131190f
SHA1e49ed419933a87d159c21064a6f484c8fabe2f88
SHA25679aac1cd1e372e5e52e2bd1719840859fff56f2384f3ce995d35c363c586391c
SHA51229d0108c41b90a053d3cbb6974575e14136f128abc72858ca9f249886f4da47206b7ba00d9b9d7f22f831d2fb8daeb0a9597a9f67cd11c227289a8dcee37edcb
-
Filesize
116KB
MD57dc9563f3fe3d263e4ce611a3983f301
SHA19b56c6a42bc7a597675f3f3c4742f86535f8dc20
SHA25681a77e4b7fadc42c3b93791ade44a66c04a07c90ac038f3a45881cf3bbb98798
SHA5122e2633e3c5060eda7086ece567b1791548987082911d58214c8f7742a368e49eb41e5464d33ea2a2af77abbd53f1c8bc1a1c632201be352c3e01c2a1b41a4116