Analysis
-
max time kernel
98s -
max time network
97s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
14-08-2023 03:21
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
kutaki
http://treysbeatend.com/laptop/squared.php
http://terebinnahicc.club/sec/kool.txt
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jaiugtfk.exe Payment_Advice.bat File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jaiugtfk.exe Payment_Advice.bat -
Executes dropped EXE 1 IoCs
pid Process 2512 jaiugtfk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133364569580298025" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2767205360-3565838719-3800013281-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4508 OpenWith.exe 3136 Payment_Advice.bat 3136 Payment_Advice.bat 3136 Payment_Advice.bat 2512 jaiugtfk.exe 2512 jaiugtfk.exe 2512 jaiugtfk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 2712 3076 chrome.exe 70 PID 3076 wrote to memory of 2712 3076 chrome.exe 70 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2280 3076 chrome.exe 72 PID 3076 wrote to memory of 2212 3076 chrome.exe 73 PID 3076 wrote to memory of 2212 3076 chrome.exe 73 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74 PID 3076 wrote to memory of 4808 3076 chrome.exe 74
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://justchapati.in/mayh1⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff90709758,0x7fff90709768,0x7fff907097782⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1508 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:22⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2680 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2672 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:12⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3968 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3928 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:82⤵PID:312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:82⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1728,i,5247125442400658728,12860478173939240137,131072 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5004
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:348
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4508
-
C:\Users\Admin\AppData\Local\Temp\Temp1_Payment_Advice.zip\Payment_Advice.bat"C:\Users\Admin\AppData\Local\Temp\Temp1_Payment_Advice.zip\Payment_Advice.bat"1⤵
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:3136 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:2120
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jaiugtfk.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jaiugtfk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5faf4cebd1bbc52e4238dc3bd37f83a73
SHA16b5099396fe811ba3d4cab1114255cedd1326fbd
SHA256410196b4c5159bdd7b40129d57c323c3773e20c5e0d0c3f5d3be8eb9a6feb72a
SHA512d3acf678fdd2d0231dea54856a040cf202d5762577b7abca8e89b67c7fca05fa2f94be87d02771591df3752098832189762d0f1cf990b80a64b215058d5288df
-
Filesize
6KB
MD58ac579e21e5ce3f7b05355e368acab1c
SHA1dcf712fece42ecb281378a1aa416b686196b7e9a
SHA2561a714795ce82234aa847370618699db22e410377c2c2a4254e8e030dddf1138d
SHA51221d7fffae6a41999ee87df4e7563e38ce8668fedfa5e434ff4efa9f6904caa25aa38022966d0080a857c3fa08fd6716e5ca08b1b87bfbb9f40c6d9499456c6c5
-
Filesize
6KB
MD5171d9d1d90eef155c335c1204a1d5c81
SHA1b5f1edb90b2cc6ea4927bfc298a55d2e90259d6c
SHA25699de76fb8da0f7951d2f2356bbfa3a271ba2fa2f16a2785453e4075735244025
SHA51227aedd1224ddd2a65acf99ab4be86578ef7c4443663bba6852be1a88d0945a70a7434ed29c6d840425c4383d3ecc1efe1cbe00746b49a871a0eea2a159863847
-
Filesize
6KB
MD5fb989055fdbd1c1f7c8b9e778d28c4ef
SHA10c942999a45d8f596dc35dc529e0f05c9fa01c1b
SHA25608e7dd54741db100f7112cd96e64e5892518cfa26aea8d86f7b558103ef155a3
SHA512f839430ca0fab955e32851daddf51be077657fb55d2bd7b24533f39b2d44f75116211e5fe06b413c5294d0722d920fc2610ad255ebdafa07f18ba6d8ed626ec0
-
Filesize
87KB
MD59fabf87e379c830ef7c78f44f680b01b
SHA1b6f37f4791a5d7d68a10bb5189386c62fda45962
SHA256d53f76d57021c08618f98fd5874b50651133dc92acbd87bb2a3d411685fbfd2b
SHA512ac1f71ee53fa1ef93d796ebe54f4229f26f7efd3b6265e9b7615c898ce6949f11c2f4e4ae383e1f3102b806fd4c80995e592885ce818fc3f17835612a0f8c78f
-
Filesize
103KB
MD571804e9b97e7dfc3e72df29dcc87d895
SHA1176e7ebf4c40120068dcbb104677f9fa082bc3cf
SHA256ddd3cf001fc45729b0c9ba45d22e43b4aa2f20e59ae951ba46abd6a4e79ff6a9
SHA5128b8875c2438bddf1e40a83477cd5f76da28efed9599f07dbde2b434f8ae1109b008365fbfd2cad90697dbb2384cb12aae06499e02624a1e4e21e07ed44cf4421
-
Filesize
100KB
MD5ad226fda648006f088310d709133fe59
SHA17aeeb9d0e9e585a63bb66fb67a624063aeb8ef63
SHA256e6c55259daaf579dd78ffea6c0a89461e5b767d9ea2bbd3cdb8922c009f48880
SHA5124c3c5ecbce676e020704a423368b041f9dcc1b7d07af583c38fc6b168256a0c720fa6fbd903eb7dba058f59a31be4e3be9220db94014987448e0cbeb434569e0
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2.9MB
MD585b8a9fce3d0ca6675ec426bcb6e4c6b
SHA1fe11385ea24781211645701d30ed650b198b6763
SHA256f273d105b0ba22b8164d3a69dc520337d2acc31067f69221bbfc0c0e60e52b74
SHA51201b7a560480551d3a3904f098721bb44020805b392917a7cae51c5671adae6a9b23cce6389af9e90dd38f932366c535fac218676d4d1211e3965d8df4be518cc
-
Filesize
2.9MB
MD585b8a9fce3d0ca6675ec426bcb6e4c6b
SHA1fe11385ea24781211645701d30ed650b198b6763
SHA256f273d105b0ba22b8164d3a69dc520337d2acc31067f69221bbfc0c0e60e52b74
SHA51201b7a560480551d3a3904f098721bb44020805b392917a7cae51c5671adae6a9b23cce6389af9e90dd38f932366c535fac218676d4d1211e3965d8df4be518cc
-
Filesize
2.1MB
MD53936402c4348e55844afa397b96311b5
SHA19c1bd645d98c6d2ce84241e068864a1e941a8f47
SHA2564370670ea76150ebda8b08759a520a3dceb2900e3ccfbd57a13e9ec654aa6c36
SHA5128eadac923f8a02757054648be3f6b6821fb69895b8dfb3ccd3ad9b564dd38fa260003395486f53da3329b8b338dec4dced589238be3fb1be0b7e5bbc01ff4c6a