Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 20:02
Static task
static1
Behavioral task
behavioral1
Sample
ViaVersion-4.6.2 (3).jar
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
ViaVersion-4.6.2 (3).jar
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
ViaVersion-4.6.2 (3).jar
Resource
win10v2004-20230221-en
General
-
Target
ViaVersion-4.6.2 (3).jar
-
Size
3.8MB
-
MD5
23269e7e0d4f35d1659f451ac777f5fa
-
SHA1
8799374bd85e355c63645f4179277e69c83be690
-
SHA256
31250fb61b690d526a47373dd9ac2811f7c87e74a6dc5f48ddbada1567c8d2c7
-
SHA512
d729fe0f85346cf37e1ba30d677c1933cbcc72befcf1ea4ef578fbe32fa8fc1d1da409f7ffc04b58d071633f745819bf95f44b99f6a18842f941e084f05e73cf
-
SSDEEP
49152:h5RWC7WZ5yKcVcSm4ZgH5yHHYncUSiMuFEJFyC8L3QoGAGZ6UaMs7S2VY:hzyZ4Kgm40yIcUS4EOQoGAGoUBFZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133295258845124679" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4348 chrome.exe 4348 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe 4736 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe Token: SeShutdownPrivilege 4348 chrome.exe Token: SeCreatePagefilePrivilege 4348 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4736 4348 chrome.exe 69 PID 4348 wrote to memory of 4736 4348 chrome.exe 69 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 1092 4348 chrome.exe 71 PID 4348 wrote to memory of 3048 4348 chrome.exe 72 PID 4348 wrote to memory of 3048 4348 chrome.exe 72 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73 PID 4348 wrote to memory of 4852 4348 chrome.exe 73
Processes
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\ViaVersion-4.6.2 (3).jar"1⤵PID:420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffeed719758,0x7ffeed719768,0x7ffeed7197782⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:22⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1968 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2952 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:12⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:12⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4356 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4620 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4476 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 --field-trial-handle=1608,i,13201944313602942027,13814767331483825999,131072 /prefetch:82⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\c7d19216-3f1c-460e-a766-783f3060ed04.dmp
Filesize890KB
MD563e873159c208574acce89a94439d88e
SHA1fa9b829c162c09aa977554dd3c3fd3e5bf546b3b
SHA256021abbb2fdf5b77a0c5584499fe53e1a61516b4979bbcbc9fab0aa03c363d9e8
SHA5120a726f2b30ec48deb38731c8d107fa3e0b8abd38c225ed903a348f94dbb3ba4dbea1336a3a63e87b62ac110bcf4da9d9d38a4a72b6f34b1c359ba45f7e90440f
-
Filesize
40B
MD5dd9a2eda3b4beca49d44d01d9398aafb
SHA10f2ff6332faf3710a198dae6461efb10c5033159
SHA256af77621dced9da095af2cf51a0a9001ba1d62fb7adcd9efd36cd5ddced60cc6b
SHA51285e7a21bbaa741ae8d43e600957dd543480202ea61c212e891fee3810bfb8e7690636cfb11adbfc0079c4948eab4573ce7929b331d69cf5f4a4559705631691e
-
Filesize
144B
MD5709c6d4a741160134d14a30cea854eab
SHA1a967e6bc4188ecc496f98642bea39fd06fd156bb
SHA2562ed22a138e3f22e6cfaf681d5e3993d8d1b717e21eb95314df27892f9bc83366
SHA5120b6652eccf3c3d0fd0bd7f09082e9e32e7a2a2f05c9d686b6b7fd11d7b57f208e2c0bb2f99db4230013b3074b7b46c506f5c859aba6d7326d70f8fc1aff087a0
-
Filesize
539B
MD516593e56478f730c0e3f0635dc387512
SHA182e8e5aec1e4404f15495d7282b90444c9015c0a
SHA2569c3456ae04e8451096382bb52e6eba973c9c2f42a66169de74cb96162cf1f1e0
SHA51272bb532af9501fe90fb2bdd8aece8e8961e3f87032cdccddbb71bf4c73c4be72e1cadd2a3c592761cea0a60f7fe831b8ffe235476d502611ed9f8192dba1d79b
-
Filesize
5KB
MD56fcd67fb5652a5ed68a27a91404d8bf4
SHA15c236eaf6cf8c1c67fb94dc7d48b9f0a5288ef49
SHA256b6b14d02d80b49ca04a6282133b53d871ffc2d5dcabc64d92027095916bc88ee
SHA512cb1f292ea201dc9ffb6475f0718e091d0ab22f70b52e7fbfff3c501dcbdd35192114eec3663eb6cdca37e285f3f155eb4c6a91af026d63805cfd21abf4ebec44
-
Filesize
5KB
MD54e46416a4c8d4db896fb37d213ab4495
SHA174f6f57248f1eae85e67319469137aacdd13c009
SHA2567f8b2544d16a8282b315494c804ea15a031bd042b47978bec7701702fe793f30
SHA5129284e4bf5eb548fa29dd0aca8fc857e4d0956e0bc0560f34bfc587dfbf39a3d8413b480f852f8b6ba6c65972e20b07d13f114346282c9ece8f55a1a441c24159
-
Filesize
72KB
MD58a6d3ed37fecaebd3dd4d750ed4b83a6
SHA1b89f086c564fe45fa7b1b9b858d94fcf8263e965
SHA2563fe295902e121eeb5e1ee8932d48d7dd565997aeb24b847e17ffbd8791eecfcb
SHA512a921b9849cab9a92805d6564c1e17c2ab6d559f155afc852470e7509e1a1cce8813c20731ad61160609f31a727d79817e0861cbb4fa0d72d04bd20b004a412ed
-
Filesize
154KB
MD5738ddae29fbd786b04168085344abb9a
SHA18c057b8797c0ba6d909b827dd52ea9e7c9e1a889
SHA2560855bdb4257d181a2ed1f262ddcac5f128626b597838ece65a08c87d221ffc45
SHA5126f19d2a553ed85ea837f07c3a73f53a3a8abf09a5d31bb27d2f84f94039d7a6922d11acd35bf8ccf3a403b147c2860734f38bab9f4209d1d0ee6f7599a5f6f3c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd