Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2023 23:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://signboardsupplier.com
Resource
win10v2004-20230915-en
General
-
Target
http://signboardsupplier.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133396404825615540" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4512 4192 chrome.exe 79 PID 4192 wrote to memory of 4512 4192 chrome.exe 79 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 416 4192 chrome.exe 87 PID 4192 wrote to memory of 4504 4192 chrome.exe 86 PID 4192 wrote to memory of 4504 4192 chrome.exe 86 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85 PID 4192 wrote to memory of 4472 4192 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://signboardsupplier.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa06239758,0x7ffa06239768,0x7ffa062397782⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1952 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:82⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:82⤵PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:22⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:12⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:12⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4508 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3192 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4816 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:12⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:82⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3264 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3924 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1072 --field-trial-handle=2000,i,17221842374575477988,11893467149428118713,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
168B
MD5546200432598335cb36117ca4e5d8237
SHA123c2c30689902af7ae2e64bf9f921e44c748928b
SHA25617d659c544b4e18856cec4695c579c8ea8f74a980417b781e24fb4964f453f10
SHA5125960d8ef85dbdc2362d16065bd6edb991f100a1c91f9e3a46d019aa6f828d7684148bf75de14c751253bb6d073b644152cda4d1bd403db6d7c47cdb04b5db903
-
Filesize
2KB
MD5687cea30fa86c6e04fc629f178a11028
SHA1796932d99e0c33c0b5b5398bf92c79b53f65efe1
SHA256962473cfe58900603cc48a856b1604597f662d1b51cd4f4b3dd6c577c003b001
SHA512805346b9752ce6148c0e2210cee8077a42597934ab0478b6dd531fa5cf112634dde745e8d1dc7173424327b03a036f1ce002d7b8d43c5d7699fa3333755c7ca6
-
Filesize
874B
MD5f5bc38a0ad5321c556a91d8e902cb37a
SHA183533fca849cada4fd383dcbc961eeabd7dc3e6b
SHA2565ed93b179c8b16ce787a9a801e556071e706d94e61d39710bf51474bea0b54c4
SHA512e8991ee287be102f43ecf2fac2689f64f87ae398481e17f4706fccfe2f8489547a338ba8cde57fb5b0251b64dc3db95e668fe86c333a7779b7e53fd98507f926
-
Filesize
6KB
MD542d25d740d16c54bc61010ecd9db2de2
SHA1f5fea0a968abcb76c2f271ea02836de7d9ec0c74
SHA256e531dc373aa899aa76276be8fb21b6d6b2fb149ff26ec9f496fc0d6098273c10
SHA5126ce904343f977de6182d5be8dee4808641e9e68effdbf1b8ce0156b8c00b3cf3ac3f2ca8393f4810034acc1ce7d06b6ac88867b54991214dc849d941bf64bc49
-
Filesize
6KB
MD5779a7d8e7722fb8618deb0bf41a14f13
SHA15bcc378da60ef29639761382eb7467da55a2443a
SHA2566542790df30d1c666c7b8fee2f61a5376763efc6ad4d38edd3f13e792e08c39a
SHA512d91121d208f531fb99b77d748996875781ac434bd06b401caaf8d7be1e849a5064773fe4a11975ab434b40be733bbfff04c6502c9a997c297f7ea42b0ecec58b
-
Filesize
122KB
MD5bb2d462dceeeb867f635150c31cd24c0
SHA16042f6526e375e2d0c27f51cc9064c75bc83c6d2
SHA256c52a23441559ac626a52b675a9722fde8ba307cd8781ee67a6a948387c82bf9e
SHA51239624799fa910034fd0f8cab0109179b34c851ebb47054d686df7de731b935cb3d66c85acb4c217bb1db65b9d42572a1d47c1858408ebf972bd71b25bf70b94a
-
Filesize
121KB
MD51b7aedd1026db8b91775dfe22d8bc752
SHA15d5a28d56a82b4fc202d8f07c9dec6584392a732
SHA2561f9c8a7196d3722caef83e2d882bee6aa2253842b779026744a845c93493a0fc
SHA51210ec88329c480fb6ed5cec1729b1a4e457678ccf90d0020396520e087e13c2ad74004267235713454e9cb83df2e0830145fc99e0d6b35df0bcb11197e3c9f8c7
-
Filesize
104KB
MD5d849964786b870b68ac8140beba4351e
SHA159c8306b697b7d2588334c27e0c4261467c1551e
SHA256d5ad4d60e124bba9d6a9508c2895e71660821afa82e1de060a61fa66352cd255
SHA5126747b7b777520f4518f229365eb581132d989eaec5253d388ebf2cc14cce3d73e6223646042703176ff823b367c7c6c3aa41ae2d0e373c3e81ed428f68e5d9e5
-
Filesize
103KB
MD534c5cccb91400f8d582221c8af1ca348
SHA15430b04e61ba1d73472c91b2a533c870907c36d6
SHA256530658b0feecc4371e907066e24cbccc1586344dd73ec10279b4b27cf13ce132
SHA512028a7099eeb0573a756f47197a6864e10aa1efaec6f0859292a24cc405c812462f9bcd9bb6aef55e32d4c17f79bda9e2c413a1f375caaac57c54ba288f8a82fe
-
Filesize
103KB
MD56bbff12b647fca3cde020aa8f6d0787f
SHA1638ebeb7a4f3afcc6664bdc62b8fbbf15707908d
SHA2566efed5af813fe30a790f71da0d191da4ddc6aa7e789b5664c33510a55eee247d
SHA512fff0cf6919c2fa489fd4aee0bdd2d4f0dbe252584bbfe82102ac61c524849b2d47b77b355b45c66387540e5e6b909fb57ffe6077d64138ba1c2bc8169335a706