Analysis
-
max time kernel
56s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 07:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1>m=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=¤tp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4
Resource
win10v2004-20230220-en
General
-
Target
http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1>m=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=¤tp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133265343290095373" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1968 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe Token: SeShutdownPrivilege 2748 chrome.exe Token: SeCreatePagefilePrivilege 2748 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe 2748 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4572 2748 chrome.exe 84 PID 2748 wrote to memory of 4572 2748 chrome.exe 84 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 3156 2748 chrome.exe 85 PID 2748 wrote to memory of 1996 2748 chrome.exe 86 PID 2748 wrote to memory of 1996 2748 chrome.exe 86 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87 PID 2748 wrote to memory of 3672 2748 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" "http://googleads.g.doubleclick.net/pagead/viewthroughconversion/695735168/?random=1682060255043&cv=11&fst=1682060255043&bg=ffffff&guid=ON&async=1>m=45be34j0&u_w=1920&u_h=1080&url=https://thai.monkeytravel.com/user/product/product_info.php?product_id=1076752430&checkInDate=2023-06-01&checkOutDate=2023-06-06&amount=&adult=&child=&age=&ref=https://thai.monkeytravel.com/user/product/product_list.php?city_id=21&part=hotel&age=&mapSearchYN=N&checkInDate=2023-06-01&checkOutDate=2023-06-06&name=%EC%98%A4%EB%A6%AC%EC%97%94%ED%83%88&topSerachDetailBtnOpen=N&priceFrom=&priceTo=¤tp=KRW&topSerachDetailBtnOpen=N&scrollTop=Y&hn=www.googleadservices.com&frm=0&tiba=더 오리엔탈 시암 리조트 (The Oriental Siam Resort) - 몽키트래블&auid=856196684.1682056151&uaa=x86&uab=64&uafvl=Chromium;112.0.5615.138|Google%20Chrome;112.0.5615.138|Not%3AA-Brand;99.0.0.0&uamb=0&uap=Windows&uapv=10.0.0&uaw=0&data=event=view_item;id=1076752430&rfmt=3&fmt=4"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb46e39758,0x7ffb46e39768,0x7ffb46e397782⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:22⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:12⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:12⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 --field-trial-handle=1816,i,5628292483675806177,17674718818051728643,131072 /prefetch:82⤵PID:1988
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\f.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1968
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD549a0c5cc62cee3e576afff36d353a618
SHA101e5075736fdd3e44dfaf2d7c149e0b111d3469e
SHA256504730cf0cb717bda7b320459b701e97cdbbc6fe408d150dec675a5a1e520007
SHA512e6fbe1204ab0005496fcb0fd5699866f12aaf953ea6eb0ae43f5a9f345b2531ce81620b023e5f6884342f62446eea4216118f0d9dfc0c3d5af260504dc2cd2f0
-
Filesize
5KB
MD5002a6ddafd658853271c21e97fc3e7e1
SHA1d4b96435f773feb067c37e0161ce0332ae1edc6c
SHA256a778a040db183d121164a32a915fcc26260b2b57f797f85a3f3fd2426bc46cb2
SHA5127c30244d8a423eb8f4c3c00f1549d7e2858f7e7dcddab124d1b7d812061c1c1ed196de06e430f7333876628601fada9199cf85b91c19131b5ef54f4454ab6bf1
-
Filesize
200KB
MD569d91301bd8436255290065aba23eccd
SHA1cee64921af908b2dde5e24031c68a35419abf9db
SHA25602d15346c96f577aa84b94cc52c9556f2f22f0fc001b51bfda770235634a9ae0
SHA5128bebd5ba9e0d3e5ff9571ec5021403ffdb37770ab7f080dd3bccb3153e63ce51eb82ca09cf6b163e1b78ddafc525f70c4cd6eec927abd1073e0003043f8cc5ce
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
43B
MD5ad8b6f08655797587cdec719a94efe59
SHA1182adf5a140796f81e930649d05654dbf22fd5b7
SHA25677d5fe96defd6c8c1e3b0466b4827cf83dc7e5c727a10177e115d25132fa86f6
SHA512519a8ea7ce2ed8661cc72d58bc0c02e721ef8e64608f4d2e26a56a970d43ebbf21bdf579c543ee1dfd667da8f87467c60111a3e6d246d435a5c2d066ab88efa3
-
Filesize
43B
MD5ad8b6f08655797587cdec719a94efe59
SHA1182adf5a140796f81e930649d05654dbf22fd5b7
SHA25677d5fe96defd6c8c1e3b0466b4827cf83dc7e5c727a10177e115d25132fa86f6
SHA512519a8ea7ce2ed8661cc72d58bc0c02e721ef8e64608f4d2e26a56a970d43ebbf21bdf579c543ee1dfd667da8f87467c60111a3e6d246d435a5c2d066ab88efa3