Overview
overview
7Static
static
3jane400.zip
windows10-2004-x64
1Jane Style...ja.txt
windows10-2004-x64
1Jane Style...ig.txt
windows10-2004-x64
1Jane Style...ne.txt
windows10-2004-x64
1Jane Style...me.vbs
windows10-2004-x64
1Jane Style...ch.exe
windows10-2004-x64
1Jane Style...xe.xml
windows10-2004-x64
1Jane Style...st.exe
windows10-2004-x64
1Jane Style...le.chm
windows10-2004-x64
1Jane Style...le.ps1
windows10-2004-x64
1Jane Style...ce.dat
windows10-2004-x64
3Jane Style...s.html
windows10-2004-x64
1Jane Style...s.html
windows10-2004-x64
1Jane Style...tr.txt
windows10-2004-x64
1Jane Style...s.html
windows10-2004-x64
1Jane Style...mg.bmp
windows10-2004-x64
7Jane Style...st.ini
windows10-2004-x64
1Jane Style...ec.dat
windows10-2004-x64
3Jane Style...ze.ini
windows10-2004-x64
1Jane Style...nd.dat
windows10-2004-x64
3Jane Style...se.dat
windows10-2004-x64
3Jane Style...it.ini
windows10-2004-x64
1Jane Style...ig.dll
windows10-2004-x64
1Jane Style...32.dll
windows10-2004-x64
1Jane Style...e+.zip
windows10-2004-x64
1Jane Style...e3.dll
windows10-2004-x64
3Jane Style...32.dll
windows10-2004-x64
1Analysis
-
max time kernel
602s -
max time network
501s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-ja -
resource tags
arch:x64arch:x86image:win10v2004-20230915-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
21/09/2023, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
jane400.zip
Resource
win10v2004-20230915-ja
Behavioral task
behavioral2
Sample
Jane Style/Document/bregonig/RE.ja.txt
Resource
win10v2004-20230915-ja
Behavioral task
behavioral3
Sample
Jane Style/Document/bregonig/bregonig.txt
Resource
win10v2004-20230915-ja
Behavioral task
behavioral4
Sample
Jane Style/Document/openjane.txt
Resource
win10v2004-20230915-ja
Behavioral task
behavioral5
Sample
Jane Style/Document/Readme.vbs
Resource
win10v2004-20230915-ja
Behavioral task
behavioral6
Sample
Jane Style/Jane2ch.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral7
Sample
Jane Style/Jane2ch.exe.xml
Resource
win10v2004-20230915-ja
Behavioral task
behavioral8
Sample
Jane Style/JaneAssist.exe
Resource
win10v2004-20230915-ja
Behavioral task
behavioral9
Sample
Jane Style/JaneStyle.chm
Resource
win10v2004-20230915-ja
Behavioral task
behavioral10
Sample
Jane Style/JaneStyle.ps1
Resource
win10v2004-20230915-ja
Behavioral task
behavioral11
Sample
Jane Style/Option/ImageViewURLReplace.dat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral12
Sample
Jane Style/Option/NewRes.html
Resource
win10v2004-20230915-ja
Behavioral task
behavioral13
Sample
Jane Style/Option/PopupRes.html
Resource
win10v2004-20230915-ja
Behavioral task
behavioral14
Sample
Jane Style/Option/ReplaceStr.txt
Resource
win10v2004-20230915-ja
Behavioral task
behavioral15
Sample
Jane Style/Option/Res.html
Resource
win10v2004-20230915-ja
Behavioral task
behavioral16
Sample
Jane Style/Option/SearchEngineImg.bmp
Resource
win10v2004-20230915-ja
Behavioral task
behavioral17
Sample
Jane Style/Option/SearchEngineList.ini
Resource
win10v2004-20230915-ja
Behavioral task
behavioral18
Sample
Jane Style/Option/URLExec.dat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral19
Sample
Jane Style/Option/brdcustomize.ini
Resource
win10v2004-20230915-ja
Behavioral task
behavioral20
Sample
Jane Style/Option/command.dat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral21
Sample
Jane Style/Option/mouse.dat
Resource
win10v2004-20230915-ja
Behavioral task
behavioral22
Sample
Jane Style/WriteWait.ini
Resource
win10v2004-20230915-ja
Behavioral task
behavioral23
Sample
Jane Style/bregonig.dll
Resource
win10v2004-20230915-ja
Behavioral task
behavioral24
Sample
Jane Style/libeay32.dll
Resource
win10v2004-20230915-ja
Behavioral task
behavioral25
Sample
Jane Style/sample+.zip
Resource
win10v2004-20230915-ja
Behavioral task
behavioral26
Sample
Jane Style/sqlite3.dll
Resource
win10v2004-20230915-ja
Behavioral task
behavioral27
Sample
Jane Style/ssleay32.dll
Resource
win10v2004-20230915-ja
General
-
Target
Jane Style/Option/PopupRes.html
-
Size
320B
-
MD5
77d37238c540d9fbc5452599cc28f8ba
-
SHA1
c32f472f0f587515708eb78e1386ab0c1f3e97ae
-
SHA256
2a3501a2976be8d1f7121e591aadf4b239f685021d511a84f0e0175bc33c60c9
-
SHA512
bbf320379f9fa9dce4b06dedddbe590b64c1979f8566464244303408e13368f474f11df31488cec20b127bc0fa44dbaf214924d8857ae22117fd4f863c2ab4f8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397795542791878" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe Token: SeShutdownPrivilege 2156 chrome.exe Token: SeCreatePagefilePrivilege 2156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe 2156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2096 2156 chrome.exe 84 PID 2156 wrote to memory of 2096 2156 chrome.exe 84 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 800 2156 chrome.exe 86 PID 2156 wrote to memory of 1916 2156 chrome.exe 87 PID 2156 wrote to memory of 1916 2156 chrome.exe 87 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88 PID 2156 wrote to memory of 4332 2156 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Jane Style\Option\PopupRes.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda4e49758,0x7ffda4e49768,0x7ffda4e497782⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:22⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:82⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4892 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:82⤵PID:1684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2840 --field-trial-handle=1868,i,1472633105043896914,13754904141468511791,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f801a93e13c26fba27f963c05ce1b270
SHA14c2ee92e80eed3a6fe9cf192753105ac5e11c5bf
SHA25681d4acdb949db94378c5dd6e033219b27a2e901cc102ff8c061b528e9aacdec0
SHA5126ab35ebfb001ca1baea3138a136f76bb947d0c85c74bf0dd968a9c2db8764a2e2fa5a5160046f92d413d9b87b2550509b096ab93ef8777fba5ce69347d837814
-
Filesize
6KB
MD55ece83be454b0e49b0af6993fbcbf23a
SHA1a509d42de5a4cc67b1d5e9066d11653f28fe4323
SHA256d7c9525eb66a8674fee9d4e2ee98a556c6136f481491c2c9f37e56909aa452ba
SHA512660a0f6649da82de76897a86b4f3e8bb5d8195e957edfcb23fa313f98026f3d63d2248b089afb6ca4306711b93d4fd19d77b7effba8c0806ff64d68ff83d0fb3
-
Filesize
6KB
MD5ac93bbd47bd387f0c03bbe4af3b8e1c5
SHA13ea11010f13744ddfd532f496a200a0ca7b3efe9
SHA256299fd93052b315f314e19f1e19dbd72325d7fe25061c109fad0dd4c8878b01e5
SHA5126ff264a9ff7d64f27700a959e9056ed051e66154ca3e218bb90ed27ba8d437b91d3103573c54fe53aeb0debe0d91bfc2ddc93209525628ccfa1a1ccc68f0488f
-
Filesize
102KB
MD5de7a8924fab13ee6cefe073fd25992f4
SHA1d87daf6c99099e3d47777670d2befb8ca1bb3463
SHA2564e20121229bef9d4cb2d674b2b08671e051182e8bb8008a705b515b9545dd3fb
SHA512f5d3daa47a739741430eaf9d715e3771a7c953f9aa82a8a7e953ea0dd2be3fdb659030162cb4913391192ee831ea912f688650437ec10ffd61c36abe06f60165
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd