Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-es -
resource tags
arch:x64arch:x86image:win10v2004-20241007-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
17-01-2025 21:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1DwIFsVFvP3HCS0yablaEw3GjehaS8KJ3
Resource
win10v2004-20241007-es
General
-
Target
https://drive.google.com/uc?export=download&id=1DwIFsVFvP3HCS0yablaEw3GjehaS8KJ3
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 drive.google.com 9 drive.google.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133816245245598804" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe 4384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe Token: SeShutdownPrivilege 2216 chrome.exe Token: SeCreatePagefilePrivilege 2216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe 2216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1976 2216 chrome.exe 83 PID 2216 wrote to memory of 1976 2216 chrome.exe 83 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 648 2216 chrome.exe 84 PID 2216 wrote to memory of 4000 2216 chrome.exe 85 PID 2216 wrote to memory of 4000 2216 chrome.exe 85 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86 PID 2216 wrote to memory of 2524 2216 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1DwIFsVFvP3HCS0yablaEw3GjehaS8KJ31⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff9737cc40,0x7fff9737cc4c,0x7fff9737cc582⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:32⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4588,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4768,i,13361223339573385842,18251085654199207310,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4664 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e4c5f0f2683880b23e4d7e769c375c90
SHA14a83f1d957c53e271888b3984214ce62eb9ca676
SHA25669fd0df417ceb8943d3f28b28e161945bd7fa8f64a708d9c98eeff0b78460e47
SHA5122e418d247e9988cefea9256ef27edd02e29272b40e83788ff1ea2023d6a30530d13c907bc0ddbcf058a4dbde45c00ab51c7fba89da739b6bf7fd9cc377dada35
-
Filesize
1KB
MD548ae4620b65423f9248c7cc2f6e51d04
SHA1531e19fbcc224682ad6cfe880faa8faf91bda0e7
SHA256c84e68534ade0dbcad0a59f5b3d3cc61ffab9d06688da42b238d21050dffba7b
SHA512c0e6e01e5bd3f5c4ba805be7417f88d0f7d423a71a0d1d51c6d91bfd1c39934fe139262c1bb3611cf4fd9950c0099614dd2570a484d3572b3fc1a0b42e7e5fe5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5c10b4eeed59d276c8078c7df22e09897
SHA18e20e72ba2b85f3c5affe4656d09876538aeba16
SHA25653582a58133c9a36c1ddb1ea8e17d768e724bc211befce28bf98eaee21b299f1
SHA512aca027fea9211a0ab4f3f0ecffca923a3c50194714e4251d3ebf3b530579de1a265e5368e5f521a21c1fd62d89bcae8f3ebc3526e8aabaa3568ce215b148dfe7
-
Filesize
9KB
MD5881443e814fb7ffb3c3c22adecf25783
SHA1b0aa0a590e650f5594ac59e9115ad199cea2dbe6
SHA25629c8475bc072d888fe9ad1118cbca6b1d9b24c49bb644a8cd36dcb77b734ae27
SHA512c37d28bf3e5d3cf909915c9790dc3b0665f1cf57b9e576222fa9e745b563db4fc8e85d49d02b0bef148f4e40f317953b88e6d72e330f8b9001ca2555049dcb48
-
Filesize
9KB
MD5bdb18d5f69064a5f917940555e10c6a4
SHA1b6bcca47e35939ef033f0fcc58e963ac0923a89e
SHA25664e8d545c5f5fcf025c4f3fa71fd69b970e08742228ae4c28cefd670e4aad83e
SHA512044b1da655b2fc8d1d042a3e5f166324a0499391a19a19de7e5df858b17457ad0b246ae01a273a54889e9ac64cc1e4d5a03332671064605413fffdeccfe26647
-
Filesize
9KB
MD5362fd93b081cbc2d9d75e8f816f88d37
SHA1abce2aca1b8177e64f0e623cfa245ec31c639d43
SHA25616e4b1af89bae5f77ed9fedcb98bf17f9b045ba34360770930ae3192580b8489
SHA51280d6cb04dc696b1704b3298edb14d2cc0dbfc348db37802ee3bb21c1d3482627ce2198f248adfb25dd14cb154826b0f47469c26e3ce634353421de3cde39f697
-
Filesize
9KB
MD5d83924af8902510e040ec2d2fe87cbae
SHA1f0f9b66815f1ec17af38384787aff06be1874b61
SHA25652923632e1d96057ae449d4274ba18a4b5dfcf8539e3bf11019c845f80391079
SHA512f92efac9bce1a0c0954252f418e397d0014e42319840df793dd1061fff4fead40079924b8633c826301d862044de361e5b9b041ec8b2275c5f74a5106770e48b
-
Filesize
9KB
MD5e004d38dae7b475e4768bd97998b0734
SHA17e50008959e88886d395e166ca6c607ad973ce37
SHA256aadd657847b6a27eaf529379d2ca55488d60776085d911144e5830a595df1320
SHA512a5a8b455f4d9b6487207749175b6ffd1f3560397ed95f0e6d2d81cb048885abad00c546dbfae761a7f40b229b40b01485ac696285b58edc0edf23f163a9c59ce
-
Filesize
9KB
MD520326b9cd13e7cb343a90ba0850718ea
SHA1977c50e17fb30475cf8711d72aa45bab7bf25646
SHA256b4a0b2928910becdba0ebe453a8256ca208b934fc53fc3f8b7de8b62f7f1182d
SHA512e9c78a5a13c1b62a5b115a74c566f70055e74b378c11f24e33d0aa7b45aa940161ada33a6f2391b1b7ae75f4b97085688ddf8427730f5cd6a933fcd1e67209a3
-
Filesize
9KB
MD5f26784f01a30c4a32af4b840d2e7c211
SHA1687df25d06506c27f400f45d966e2f2ade8e7b40
SHA256cc207baf53080c223e51ceaac06e099493a2428432fd5f63ca33906d5e9e65bc
SHA5122b2bf25a990c15ffbacf042b4e7481efc409225721eaf06d32d5bc4a80f30b0b8d5c09fbb0be1b217c2b462e50f68ae6b7cd29c916835b029383e851405df231
-
Filesize
9KB
MD5de251d32f02af356e0b05fc8580a6bbd
SHA1140320015177a7dba059918bb8336cc4f63b7edb
SHA256ab12136037c364cff5c9214dfb4b590a0513f4511f0f1958c57db13f35b74eb6
SHA512015e5ceae5796e926c0adf75c0aaaa372c94ae1a9c9d4c9a399a7fae9a200e2d2eaa6ead8b0854fcdeed26d9edbfdea105e130bd99eeaf6f81b37b3d433d6df2
-
Filesize
116KB
MD5bfd894e7ee070d7471382dc2a5d8c611
SHA18137700ee8f542c4dd8ae4923d110da00f6f4771
SHA256031025b5ca70655ea75ba1f77f8ace6bc87cd8e4ac2693c8ce88dc847ed8869f
SHA512c9d5d614e9beb7266f13352c57aff17ac2191c2bc01cc3ff03475cc67c344522168085ff257221479a0706cf897a77fdeca9b1e705c489ad69f1ccd8754cfea4
-
Filesize
116KB
MD572b8f3f5824f3e17fea166c231bae95b
SHA1a2bd0c6d4ff70682a69ed4f99bdf7db4d5d6129f
SHA256f6522b509b1bc947bf7bca6714efcf4f1d882bb966aa364dbf851c879f571f97
SHA5128dca4fc4a95943e4c32e87f794d74744fe981a50067277f4ce4710bba9025b15e7064ef3c5bab2d90fbaf26cd3ae54f030db4c44ec0e5d0b30d89a0b7fafc575