Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 10:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ecp.yusercontent.com/mail?url=https%3A%2F%2Fci3.googleusercontent.com%2Fproxy%2FfDYVCz7jcl2pj3YsxYcj2DkBAPejhiTpplkmeIZOUnjJ6t1XIUByHlMBOvuODWzZmPMmLr0E5Y2ghQC1I7OCiMpYaN_mA81fa3Fj6NbJoBSm7b7TvSzdYdCwTgM6k_saMJoSNggzMdnlFgDb6d6n674zoJWu1jg_zAF7602jNTh7lFNBSzXLyQ2h9qsJzId5oqfz2EaakNKo9H4WuPZd3ps0MZeMzCNWZ34DILm5E4SCptYvDvHQBN_D44ocRPzzrz6Wq_maXT8yIm2UL3w%3Ds0-d-e1-ft%23https%3A%2F%2Fecp.yusercontent.com%2Fmail%3Furl%3Dhttps%253A%252F%252Fwww.austinpowerequip.com%252Fsiteart%252Flogo.png%26t%3D1686156784%26ymreqid%3D51524004-a633-80fe-1c9d-50009401dc00%26sig%3DtG8Y4FdfxPedOt.biXeDeg--%7ED&t=1710773177&ymreqid=fdbca0e2-3a20-917f-1cb8-04007701b500&sig=YpuumORXjUYiWsqadwqYCg--~D
Resource
win10v2004-20240226-en
General
-
Target
https://ecp.yusercontent.com/mail?url=https%3A%2F%2Fci3.googleusercontent.com%2Fproxy%2FfDYVCz7jcl2pj3YsxYcj2DkBAPejhiTpplkmeIZOUnjJ6t1XIUByHlMBOvuODWzZmPMmLr0E5Y2ghQC1I7OCiMpYaN_mA81fa3Fj6NbJoBSm7b7TvSzdYdCwTgM6k_saMJoSNggzMdnlFgDb6d6n674zoJWu1jg_zAF7602jNTh7lFNBSzXLyQ2h9qsJzId5oqfz2EaakNKo9H4WuPZd3ps0MZeMzCNWZ34DILm5E4SCptYvDvHQBN_D44ocRPzzrz6Wq_maXT8yIm2UL3w%3Ds0-d-e1-ft%23https%3A%2F%2Fecp.yusercontent.com%2Fmail%3Furl%3Dhttps%253A%252F%252Fwww.austinpowerequip.com%252Fsiteart%252Flogo.png%26t%3D1686156784%26ymreqid%3D51524004-a633-80fe-1c9d-50009401dc00%26sig%3DtG8Y4FdfxPedOt.biXeDeg--%7ED&t=1710773177&ymreqid=fdbca0e2-3a20-917f-1cb8-04007701b500&sig=YpuumORXjUYiWsqadwqYCg--~D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133553194439316857" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 1576 chrome.exe 1576 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe Token: SeShutdownPrivilege 4420 chrome.exe Token: SeCreatePagefilePrivilege 4420 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe 4420 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2772 4420 chrome.exe 89 PID 4420 wrote to memory of 2772 4420 chrome.exe 89 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 3856 4420 chrome.exe 92 PID 4420 wrote to memory of 2260 4420 chrome.exe 93 PID 4420 wrote to memory of 2260 4420 chrome.exe 93 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94 PID 4420 wrote to memory of 1860 4420 chrome.exe 94
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ecp.yusercontent.com/mail?url=https%3A%2F%2Fci3.googleusercontent.com%2Fproxy%2FfDYVCz7jcl2pj3YsxYcj2DkBAPejhiTpplkmeIZOUnjJ6t1XIUByHlMBOvuODWzZmPMmLr0E5Y2ghQC1I7OCiMpYaN_mA81fa3Fj6NbJoBSm7b7TvSzdYdCwTgM6k_saMJoSNggzMdnlFgDb6d6n674zoJWu1jg_zAF7602jNTh7lFNBSzXLyQ2h9qsJzId5oqfz2EaakNKo9H4WuPZd3ps0MZeMzCNWZ34DILm5E4SCptYvDvHQBN_D44ocRPzzrz6Wq_maXT8yIm2UL3w%3Ds0-d-e1-ft%23https%3A%2F%2Fecp.yusercontent.com%2Fmail%3Furl%3Dhttps%253A%252F%252Fwww.austinpowerequip.com%252Fsiteart%252Flogo.png%26t%3D1686156784%26ymreqid%3D51524004-a633-80fe-1c9d-50009401dc00%26sig%3DtG8Y4FdfxPedOt.biXeDeg--%7ED&t=1710773177&ymreqid=fdbca0e2-3a20-917f-1cb8-04007701b500&sig=YpuumORXjUYiWsqadwqYCg--~D1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe778b9758,0x7ffe778b9768,0x7ffe778b97782⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:22⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2216 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3096 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:12⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2420 --field-trial-handle=1840,i,4664183253721130624,8760275899537742735,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b60fb380560a5008916163b9dff0a9a8
SHA1477fb7c3dbd0f85e022f0b61ab477d5ffc211e1d
SHA256bac6ad4a350202553fe4a52317db18f838a11f5cc51e46300470dc94c0d2724f
SHA512cac1582c5f3f3694df910e70052877eacc6c536f2e749605fb5f399230acc06593ae9d26f454770014ae881040975d7374cd6f8a02a4b985eaec39817f60770e
-
Filesize
1KB
MD5b27326cf35d32777faa9b82bc1566b8d
SHA13a3337d77efd7b997fcb701569cfe27216daf3ff
SHA2565b956fde5b0dafcfaa4b9a27b88d781c3923b9db526194490f93a39b40c71233
SHA5128cbcb5153e330513ee95b4a47e4e0bf795cfafc7589d02b2e259106d767c5db9ef465074ebc094e2d5fdbd14fc5d67f8270c78713f417fdfb53e2023cd20776f
-
Filesize
371B
MD56ef3cc4677af2d191221a68f9e3921a3
SHA16864b4b0b2e27691d7d13a7a38f84ea2da93c562
SHA2565e730a0261fbe820866bf0907e55964d6056e2b9f212427aafbb0cb9f27dc83b
SHA5120b5f2283dde1edc55b1269cb363e5ad85c9a0fdc348a0d0498d8947084fcebb3a92bf6c1b367f1dab89a0ac2d5854b8328618e831c2cd64b9befc5c3e984762d
-
Filesize
6KB
MD53a31bcfc58d29c55aaf7af42b71bd849
SHA14ecd9276ef33fa95645cc9f6949842b009d3a0f0
SHA256b9e465a9a311e9ce3b502e0c4baf5165fbb10b4d8c7b840a8bf928338e76cb1e
SHA512c292ddfc878c9a27e02d5c8f368cb1ac5196d51edb8890ea2791c3b8835988bba4c0a773882877a111f2160d8db16aedafc8d0e63027ef8ac6f676cae2b90df8
-
Filesize
128KB
MD514cb861ad1122c3acd80672387ff7987
SHA154bf74d8ef4985a97d9013ccb81e399bff234f92
SHA256529a348507415b26a6fb652da72a32b32bd6d56d29d37ec21f7e88048797cf28
SHA512318e432033c639884e8232b000467aa9fddd29363c045f282cdc59f24609d50f271effe49cb2fe6b4c005c50ef9779c2b878fa0d38805e19218a92a18dde048f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd