Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 03:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//vindexarx.com/itu//FloresCarmenSusana/RmxvcmVzQ2FybWVuU3VzYW5hQEpvaG5EZWVyZS5jb20=
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//vindexarx.com/itu//FloresCarmenSusana/RmxvcmVzQ2FybWVuU3VzYW5hQEpvaG5EZWVyZS5jb20=
Resource
win10v2004-20231215-en
General
-
Target
https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//vindexarx.com/itu//FloresCarmenSusana/RmxvcmVzQ2FybWVuU3VzYW5hQEpvaG5EZWVyZS5jb20=
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512320709401987" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe Token: SeShutdownPrivilege 4300 chrome.exe Token: SeCreatePagefilePrivilege 4300 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe 4300 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4300 wrote to memory of 3112 4300 chrome.exe 84 PID 4300 wrote to memory of 3112 4300 chrome.exe 84 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 960 4300 chrome.exe 87 PID 4300 wrote to memory of 2632 4300 chrome.exe 86 PID 4300 wrote to memory of 2632 4300 chrome.exe 86 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88 PID 4300 wrote to memory of 2472 4300 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ad.doubleclick.net/clk;265186560;90846275;t;pc=%5BTPAS_ID%5D?//vindexarx.com/itu//FloresCarmenSusana/RmxvcmVzQ2FybWVuU3VzYW5hQEpvaG5EZWVyZS5jb20=1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff968479758,0x7ff968479768,0x7ff9684797782⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:82⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:22⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:82⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:12⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:12⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=5060 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3260 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:12⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4992 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:12⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:82⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5368 --field-trial-handle=1924,i,5557213634343821566,1390997227373201197,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD588110d9080db1e98f9f3bd335bbe5721
SHA1f0e4103889fc6276c5316db280a941afa3d4c557
SHA2567356e16d79d4eb71b75f9011898dfaaeb8c612d79c20f7b10185c4c91f33d0db
SHA512e197e2ec3b10ff95101470f131c3bfd6a82114198507dd8cdcf0a69df9224828d7271fc039be38a2b9c137a709da4ee9f06cb25749f6577d3e9f2624518a758c
-
Filesize
1KB
MD534092a453438c10a26f47b468e9815b8
SHA1ef6fce2e8dab83f2cb77ca0ed864289249e5c972
SHA256db23e190ef1f05528afed2a0314a94e26ebaa539b14192f74dc27621a7c622b7
SHA512dc67db546481097a9bdd3e501666c3e06d1ea83a6dd8d90e186d6e3586a88971521a3e788e0e2aad19c5e36b69d0d4138431d9a4fc2e1fcd369262f26d90a8d3
-
Filesize
538B
MD5b97d2ffc694ac196209dcf01823170dc
SHA125c667ece661c62e09983b2b086173abecb66683
SHA256a6b61c2f567ad84220d93f4c5d5dd7ba1dfed7c3ee79aa7e28e18719981277de
SHA512fea93944bcb3c7a091c0863224a8116e794aedaf7027928ebeb123ec2b751b4533acc8f403ca9f4f62bb2589bf4599878dfc47923965e7a4896c80027182927f
-
Filesize
6KB
MD5ee961dbd4ebfec1960962523654cd261
SHA10bca23d47d7ed33f5180e9ed3f59d74070ed750f
SHA256979a2cb732819de247cc27151d9a3cca808413901b8cc2a548bfdc358887e796
SHA5124acc3909e37c2bad51144636cda156d818fb153681e169c429792569620d126aec1d0313c8e3d164ffc5c011d2cdcc46c50086501894f36ed8aa74171753f9b4
-
Filesize
115KB
MD5261a4418e33beaee6f804c6d33a463e8
SHA15020e1420222cf20980014cc69155da241248503
SHA2564e70df5b8efc96725a5af15221b004767f7f9041aaa4f7cb18a5eea25e8b9f35
SHA512a2829ddac759c73bdf81fc99c336f92ee3742364f2b2284d02bd80da522732b13d46d9e926f7250de5857083159046a25f5d16a03014deac7e7b42c54548b0e4
-
Filesize
116KB
MD5c6862a70071cc821cc8b9bd8f715fbb6
SHA160f953fefdc0e0cd6aa2848d2a458361c339d334
SHA2563f4ca597e50971cbf2b1b519c4f58683b6147967323faa6c230a72a41841cbaf
SHA512d5fd1a47f27a1fc9053e2220386ad9cf5444d90b8cbf311c7408a06d8aa13bbc99fee47c18613716564be21218d3c4cc364b7c43478d1d1b57119f8c5027adca
-
Filesize
115KB
MD5515c8cc36245d4c106c106b4081970e6
SHA1efdf079a70e1b6c1a0d99f90c534571b05098df2
SHA2566ceee26049807cbf99d7bd8566e18b49c451df61bd0ad4e2a116d53528b17329
SHA512877114bafb62e06f7159bfd43dec8d301161e290741359fa09a7a4b666d78d4e12fb39afbcb228a312dc3f363188bb61143828fc8aaba3b9fa94cbd525d906b5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd