Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-12-2024 13:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1plXXTfp-0Y4WrOy2n-NMvmxcKyt_pQd6/view
Resource
win10ltsc2021-20241211-en
General
-
Target
https://drive.google.com/file/d/1plXXTfp-0Y4WrOy2n-NMvmxcKyt_pQd6/view
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 1 drive.google.com 3 drive.google.com 4 drive.google.com 85 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133790023881409083" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: 33 4152 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4152 AUDIODG.EXE Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe Token: SeShutdownPrivilege 3840 chrome.exe Token: SeCreatePagefilePrivilege 3840 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe 3840 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3808 3840 chrome.exe 81 PID 3840 wrote to memory of 3808 3840 chrome.exe 81 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4420 3840 chrome.exe 82 PID 3840 wrote to memory of 4944 3840 chrome.exe 83 PID 3840 wrote to memory of 4944 3840 chrome.exe 83 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84 PID 3840 wrote to memory of 3256 3840 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1plXXTfp-0Y4WrOy2n-NMvmxcKyt_pQd6/view1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff998e0cc40,0x7ff998e0cc4c,0x7ff998e0cc582⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3668,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4320 /prefetch:12⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4624,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4944,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5404,i,12294928843728872934,8092688737024039378,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:816
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x464 0x4441⤵
- Suspicious use of AdjustPrivilegeToken
PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
624B
MD5f4e03631629c4489561726f2b0511d46
SHA1dda0c14edc2093fd4a84c910c2236ea8169eaad9
SHA2569e703b9b72c2ee491c17295bb59bfdb7c14c37fceff9a364698952f9aaa66113
SHA512df11720101b4471a8cd0ea7400f300b5612c96934ff1db5cd29b3a96f84a7bbf1836ee6a46cf4d510e64a092c9451053f8db89e5135f24ebc82e09898b3e3da5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5a431ea8734cfe315d733972e157160b6
SHA10ab85c56d209d4132416d2cc05acfb49d092188b
SHA256e2182ce089dbce27e7a65ad5042560ff5401b7f37cedbba2302dc9b8d927ece9
SHA512e66b2f731bf4d8e6497dd012dc26e9f34f6e2f14b72890bb452ad1500b6e050ebd75c5bd2a80d3c7371a04c1c6b82c9ce8bfe56d80fdbf904994f259e50920f4
-
Filesize
1KB
MD57bf1f2ee8443ac8bfb79e011324f65a4
SHA133aed031a2d11c7054d474af77ae0dc0d648adcf
SHA256478bc4ccfded947ca05090737bacf406341c8203b6ce0b69c110470f5926cfd5
SHA5127e8c8083adf072ed3dcfa9f6acf4781780c52d4eef7c74def6b72b8bffe06f7cf06660ee613b2d9c8a55836ecfbb05b392ef24df58a8d098bbfac0c878f994c6
-
Filesize
8KB
MD575b333c70f90214737427f980a92bdfd
SHA19a2e0aa3a96d01ce25620517991e553522f8cb19
SHA256217609a96aee3f334a1b50b5232cf89be0893e02133f982a22c71aa17bd79f7c
SHA51271d7c048afd47200c27eb752c1150f598cbe5a6bf9888a1ef27cc29e2924379a4905ce2bf268ecfa7c2274409774a43bd0c616fa8cff42bb8c57cf3ed9b7b1d6
-
Filesize
8KB
MD55bd3b53c8631d5d5a066e9fa4fb4a5f8
SHA1ff5a651a7e01d63614cf5403123ce58541f00983
SHA256fa5953fefce8cdd0262b205fb787c9b4769b8968ad880b2f329d0754e72e354f
SHA5128c274cfc84ac2601a34f4448dffadb0b39e66ddb207ef682a7571dd0bbafc3250770bc76e4aa2c6f2139ff54caccd85fe99ca80be3d2166f0acc0107ad5712e0
-
Filesize
8KB
MD5d4ad5ed24a1992e7def01bbd7f9d5e7d
SHA1ef718eafa71de4a1ef7baa3f79c9fc9f5d45eb92
SHA256f47324f65ba724a7d24b1bbaf4939fbc2d8738537736ebaa75d75a748b0bc475
SHA5127072ad73240bfd531dbd0d77c8e0732477ba85010ad3c7ced7ba81813d5577d25d728b79df1bef6fffacb62eeae4fff0a5b829d1de068d769b4c2e26e27e516e
-
Filesize
90B
MD58391fd06e682c301f62b9320920cc8eb
SHA12faba04b7feba64a22f163c41c960f704d892a2b
SHA25661697bc2049e91ab1e807cb72ecdee20f8d301a981524d588548773f0954c3f8
SHA51206a52fbb870fe5e359ac9ad01336b2ae54e5511acde11ff8f7f9dcc862df453de83f7ecaa2c2599d2e51e994ccc9fbd04b55eb5242695387dc4650b03025254d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\1\CacheStorage\index.txt~RFe578ca0.TMP
Filesize154B
MD5f499f012f61e08aa69041911dd8e97fa
SHA1c9a990f6ab1f59bf2c92ed85f1318c931b4ac7cd
SHA25640be8f995daef0205add5cd288a84219b2f1ec33da04b521c97fa3e19fe53d00
SHA512744d933f441a7d9cda9f8452d6e9de7b6d0bd3aa356c2a90602ffb29caff53999f5b3fd433aea8345c01a9970f405df1f36bb41445bbf8e01863b72888bd8b5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a049a7ac-faee-4a2a-a956-e7474387f8e6.tmp
Filesize8KB
MD59bdce526dfd61cc1d93db94eafe120bc
SHA138d504e90041e0ba38276de3b7d67b186aa8c62f
SHA256e6937aed669abe5eb4e3069840c690756929565f26dd18a3e19fbf4424874241
SHA51299e13e70e9e6ceec539670b4a0bcb64a01cca51dd99d1cb58bb22856385791c28ec7d57364dcfd1bd6aef78405cac27c74443e87f1dc3711088158b9f28279e3
-
Filesize
118KB
MD5b55c5ae6959a91c74b716c15dc510111
SHA11c1e79273abcbe1e05c853401a7e6c5862bff742
SHA2562ae4264f3bf9b12fb82a36f604c4996efc365891d59cdc66f3c3d3931612ddb0
SHA5129e91ac2e226946cc6df568afd9cf203382a1e44d2eaaf362d1c139b6ff34cc68c9ed3515ea6e4910fe45f5edea22c857dd4354169da9cf4c84e6c052163be9b5
-
Filesize
118KB
MD58064fd1e3212393745f0d98421f39160
SHA17517eb20c509ff22d93590c604411e4ec27b52fd
SHA256f814b345a7a9c8e273a1f0a25c81528ac317722db60cddd13f5ed53c60562107
SHA512cc89eaffa832394a87c44c9437808f64186088312e3414a7bd1c93f4b63426ee1855eac018f6d735188d559ee75272be6fceaec262c2b97841bda0ad19e8ef54