Analysis
-
max time kernel
62s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 09:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tg.news.getyooz.com/c/c2YxAhXufGahLMsdK92lBxjd8qVellcJI_aZenxp4aJURYHeWBrvajLqoSsoIciCYbLzNGzZb0gS7MKbwyda9GxAMGDmKm7LP9gma8oxnzo55zyhehjftQcD6madsv9_LLxjDgJxQJv2-lDyNkAYmdaabtAePEfz6_E9ZdFCdm4iCsbs98bHqfWrAvIIL5v_636jhx7zeg8oM4n2wKX9Svte5XgcZHStNKhuu3OorDL4qelLBbLBbfu8vaR8cdiD81YZit4bBcPvJQZtlAOq775NOBva2TnXB8D2F_BelpVzfXzvJ1DMzfszeU2KggbcI2xmz-QEGWF5hYsKBAN9Vx-Q
Resource
win10v2004-20230220-en
General
-
Target
https://tg.news.getyooz.com/c/c2YxAhXufGahLMsdK92lBxjd8qVellcJI_aZenxp4aJURYHeWBrvajLqoSsoIciCYbLzNGzZb0gS7MKbwyda9GxAMGDmKm7LP9gma8oxnzo55zyhehjftQcD6madsv9_LLxjDgJxQJv2-lDyNkAYmdaabtAePEfz6_E9ZdFCdm4iCsbs98bHqfWrAvIIL5v_636jhx7zeg8oM4n2wKX9Svte5XgcZHStNKhuu3OorDL4qelLBbLBbfu8vaR8cdiD81YZit4bBcPvJQZtlAOq775NOBva2TnXB8D2F_BelpVzfXzvJ1DMzfszeU2KggbcI2xmz-QEGWF5hYsKBAN9Vx-Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133221381808326702" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1524 chrome.exe 1524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe Token: SeShutdownPrivilege 1524 chrome.exe Token: SeCreatePagefilePrivilege 1524 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1528 1524 chrome.exe 86 PID 1524 wrote to memory of 1528 1524 chrome.exe 86 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 2920 1524 chrome.exe 87 PID 1524 wrote to memory of 3564 1524 chrome.exe 88 PID 1524 wrote to memory of 3564 1524 chrome.exe 88 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89 PID 1524 wrote to memory of 3788 1524 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://tg.news.getyooz.com/c/c2YxAhXufGahLMsdK92lBxjd8qVellcJI_aZenxp4aJURYHeWBrvajLqoSsoIciCYbLzNGzZb0gS7MKbwyda9GxAMGDmKm7LP9gma8oxnzo55zyhehjftQcD6madsv9_LLxjDgJxQJv2-lDyNkAYmdaabtAePEfz6_E9ZdFCdm4iCsbs98bHqfWrAvIIL5v_636jhx7zeg8oM4n2wKX9Svte5XgcZHStNKhuu3OorDL4qelLBbLBbfu8vaR8cdiD81YZit4bBcPvJQZtlAOq775NOBva2TnXB8D2F_BelpVzfXzvJ1DMzfszeU2KggbcI2xmz-QEGWF5hYsKBAN9Vx-Q1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb0b619758,0x7ffb0b619768,0x7ffb0b6197782⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:22⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:82⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:82⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3184 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3204 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4752 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:12⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4964 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 --field-trial-handle=1796,i,12249729934081932062,3840331070783863508,131072 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD57f27adb1216e4ddb02884fd68a1ec297
SHA1a33a85dfc58ca995fa184035b8fdb896866c361f
SHA256aeea36b977f073b902c2c5536b21f43e931fc2ac5ba3601db228e686457e9bc8
SHA512c1327064f05a62fe28f99830a33ad72b36f9345bb1c7de779461febfae5eea985aaf4a67f069f0e2cfec74b72b3f2d61822a4ff6689ff909c0b9d13ece5ba724
-
Filesize
1KB
MD57ec82fe64b2c870b008781a5fa5d8743
SHA1a1dd11890bb7fad482a03701eae9d66483efec07
SHA2563a32ad99a2ecd8f3c89e90b3734e0b5a4a58aac58d6fd3269b652793cb2a1fa7
SHA512a4da43b491c3640214f67af390a4a2ab43fb71373d5699fae99671d50094f6e150813cb748a329e376a47a9bcb26a79cfe8f1ea10bd9b66dd347a04c0669875a
-
Filesize
3KB
MD5b0ba1ede72ec15f14e33a4e89e010ed7
SHA1db6dec280e73de60b721c6190e59d283e592fd34
SHA256d22d7be6324a02805d8a30ae8a97cadae1365389176400cbbd1299ca3d0f882b
SHA512b18bb1b1c10393a244288c296e127dbf0152e2a77b0b0f61f5596d6ff4cf07e1240eaccbbd69d5e354776d94e9db41d8c7586f5ab63b94d976f550849aaf2ca2
-
Filesize
4KB
MD508fa93d17ad43a468a59e7b4aea8dd65
SHA1a1b9a2f9c0f87c41ef2824cca68c28fbefde9a1b
SHA25610c169841aaaa23f8f42097382f0ba0a356f3ff51c5d73c68a349a651491d159
SHA512628af1b88b855059952152901424058b0f5bc424c216d73233237f1eae9eb72b59f52b3d031173a46922a8cbe324028c9f2cd8780f065611181ac0b17cfd635f
-
Filesize
4KB
MD5447b9cf0eb099ba558da8f1280aa3e69
SHA12f0096196ac2ed3d0983e571a5963a931304e0b5
SHA256ba16c8cddf99d8ae04f95daed1f58a67021152d942fe21966e3eacdaa824d4b0
SHA512a887194dc54be14fd65fdcdb9d238babb0c530753a12e4ec84e0028890340b5cb75bfe8d6293cc89010d85d27ee9d815e763e5ab9569f51029d0c083ab367a6b
-
Filesize
5KB
MD59ea5ac0770b899bf530b2aabd3c647b7
SHA1b2521c1daa1972e00bb64a6cc496273d67617c5c
SHA256d845104e3cb1b36d50e64d7f763f199c0a15a161be5517c3153080e7e677ad3f
SHA5123ff0c6e50d7da1c532c8267fc256a7c1d2d36e6e02a4f981dfb62fbe9afcd2a2ab7e80e145e0f226146dbb6d42ed6b8dc643785ab9be6000da07410abc663316
-
Filesize
5KB
MD55cbd3b4b6a151526eac33ad6352897a7
SHA1f9cc37587dfd5f5eaf4bbeded8e50c36cdfe03cf
SHA256a232f3153273c71ef39974929b03636b9557bc338879ef45c3807bafca9a3714
SHA51234e117d1ab68274e8de8b60e123564e36d08b8955551980f78fa351e2c82623186b11d6e235b78e8d5da4a7e3a9e43b6676f8cdf1121e3d358483ff54d55b672
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\dea22ed7-6947-4e06-9602-93b8aed1996b.tmp
Filesize5KB
MD550cdbc9276e73797b5c5c3ab08eb5c02
SHA17a3ef5de3993dd7f3674f148e84b74c842ad50ad
SHA25642eca9db3d3d8d5e402b1c51a40790ce215aaa7303a9b67affedbf5d17554d7b
SHA512f8ead93ffa05990b42b11988252431b73358f532a60fd35c053056a2ee4ce4c53cb63a2d29b4b5abe2fc6056d8c3c233b6f60b13fc05676b5c0068f8515bd7b2
-
Filesize
141KB
MD53cd9934f870b89d9bd1286c49a37984e
SHA1592f32d889d23279df9e75437f46a04de021b11f
SHA2569db335f0738c277ebbffe26b9a52ca7bca7cf9b8de1bebe56bdf9a04db9b5039
SHA512ad74a02a535bb237643e5cedcd91f474994ef1982f694f54a25b0ed7539da3ce19d3cbd1b568c1433b02ee8113e26b0597e070672979e377a0c93c4159f913a1
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd