Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 14:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1jXxPfXhU_MIwvFL1JEZ-HaILx42Xtv_G/view?usp=sharing
Resource
win10v2004-20241007-en
General
-
Target
https://drive.google.com/file/d/1jXxPfXhU_MIwvFL1JEZ-HaILx42Xtv_G/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 10 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 2872 identity_helper.exe 2872 identity_helper.exe 5308 msedge.exe 5308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3916 wrote to memory of 212 3916 msedge.exe 82 PID 3916 wrote to memory of 212 3916 msedge.exe 82 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 5040 3916 msedge.exe 83 PID 3916 wrote to memory of 2984 3916 msedge.exe 84 PID 3916 wrote to memory of 2984 3916 msedge.exe 84 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85 PID 3916 wrote to memory of 664 3916 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1jXxPfXhU_MIwvFL1JEZ-HaILx42Xtv_G/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa586746f8,0x7ffa58674708,0x7ffa586747182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2440 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,10238025816386454062,17812225530735593347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2204
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5480
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\Temp1_5mods.zip\mods\libraryferret-forge-1.19.2-4.0.0.jar"1⤵PID:5620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5334bbddedec0bead2be5564eb1b1e407
SHA11c8039f13bef307427c69f9e5938da5551c140d8
SHA2560890cdc28bc9075c2db2f8505362ea33f78c31bc6838c979cf181c6fcd765c0a
SHA5123062df0aa2afb72a0e0be749189b6707bbd90e50fd6bfa1c3bbdcd9383c544dd78073edfdaee4d00c8969d8e6a7a3e7e31e12ed92cd354e3cff63b108216f754
-
Filesize
3KB
MD51e4d59da6c4383a4f0e838d9fc7c0acb
SHA144e74d7f1601acedda945c44fa66ad724948552b
SHA256f5e9079a5df3e8ff6bf8e4ed9d4868c20f04d724249e58d350662f4730c20a38
SHA512035a21c5262ab8493f3f61a6f969b791812657023411c54d27fb49d5ed1601d0f707ef3b2fe275c4f584a80bd18482e17bea4ab6f58857a27f81523ba06753bb
-
Filesize
7KB
MD541f49d92bc52fa42c90d7ca2db30a02e
SHA16856c9da9ca81653117cbe488f0ea870151a75e4
SHA2563b7562f1f4066ae81c0070fc38e6294903f4e0428457a239485dc7ef0db54a6b
SHA5128cc253de2aa8351e7d26d2800f0a7e62d70409dd1185e5f31571386338a5874a1e89e0896522730af582ac0fde4f96e1a458b1c2b0003156067a1621c9ba246f
-
Filesize
6KB
MD55ee6b8ba7967e9362367ac91e2a911b5
SHA10cb015b82088119a9bc10dd2b12adcdaf8d54e4a
SHA256c10861ccb8e01ec0d07b6454a29dbebd1ea101841d1524b175abfed22b7e6454
SHA512cae3433da01740cf5f4a3304106c6fd06c6dfdfe5099bf88a694de115b9587d687d4594355711c65a42b2a89b9b749d9ffa67bb664e08552d8edf360db666e95
-
Filesize
5KB
MD5e7b6551cad32e22f4d1bc3a77f2cbe0a
SHA134191c392e21531a6f198ddf0a96ad198f395165
SHA256d6c67b8ff13238ed453be20ef4168d80078600ae70c7aca5fdc33f8ba8700f4e
SHA51278ad6b6783b9bb510e89f0623eda698bf7a5e485385e28ef3313921b571fe963a1bbd8a77fdb890eadd420fd8cc1cfee65af245c3fe1da11264f469262a0ced6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bfd46889ba248c143239656033331f73
SHA1449c9582d2863fde8393af391a79ef14fcbf9d71
SHA2564e63d5a7330f807c4d1951aca897e22b8c047f286023adeb40a4f4bcb97115fb
SHA5127de701dd0e04030be968e8774d775fa6e1d5685574a24f583f32f391d65cf222d6cb2d8fe6dab4ffe989745951400817a8d055f62e6176ec6998f0ba6efca028
-
Filesize
10KB
MD526c2192be0c427b161fb429f5648e60a
SHA10810a304ef6e097939760085079c944f986878d0
SHA256f3cb52e83327e9dd767399b5e4ea32c16a685d4d55d6d8a10abf1560ca48c595
SHA512927f35d3043d08a5a0153635cb9e9e3e35822969ddd8423ecbde265dd94b7731e46228cc8e76c6f8047a2b3a106f1b000955986ff8b1b6b498aed65bc6ce35c3