Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 13:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://zip.lu/3itoM30s
Resource
win10v2004-20240412-en
General
-
Target
https://zip.lu/3itoM30s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584400620047595" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 2488 chrome.exe 2488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe Token: SeShutdownPrivilege 3476 chrome.exe Token: SeCreatePagefilePrivilege 3476 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe 3476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 4908 3476 chrome.exe 87 PID 3476 wrote to memory of 4908 3476 chrome.exe 87 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 2392 3476 chrome.exe 88 PID 3476 wrote to memory of 916 3476 chrome.exe 89 PID 3476 wrote to memory of 916 3476 chrome.exe 89 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90 PID 3476 wrote to memory of 1568 3476 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://zip.lu/3itoM30s1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80cb6ab58,0x7ff80cb6ab68,0x7ff80cb6ab782⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:22⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:12⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4384 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4508 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3252 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:12⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3296 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:82⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3924 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3300 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:12⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1560 --field-trial-handle=1888,i,7804915678563006200,807519077875649720,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50044f33e6a37ae863581db59ea7983f4
SHA196471887c52f68a764be10e824351e4aabf860fb
SHA25618d83ff61dedc6574f316d9678845ca5ba08feb6b89044da4713f0b4041157af
SHA512b05f40db4ec6280bb43a2a4eca6b27408570f05dee932ba42338f5bc18be1db80de6de32fa82fd66a2fdd6a674403016a1c83a0347ad4f377a40a745b9853603
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD5ae8a27bf7f43d710a54e56425339957b
SHA1880f8cb0d6a769c2f42b201a2a7fa2344c1012f6
SHA2561e2b8a6f2e194607464e84592cd7f3b21d3cc10b26eba6e07f2807d49a66445b
SHA51244d97d05cfe35817b4918c5ac4756b04c9f229962ed85a73ebd60507bc0540271758d110131e00d1a02d3e8f9503889122a6410eff5dd0a4bd11f45be6276955
-
Filesize
252KB
MD505cc8fc90a7e323d6b477b26cc23c4a3
SHA113e3bf66092ab06eee3b675af6a1575698dbc8b7
SHA256dadddad18e85b96030b9c436831a54362c531e10ebc9489f6cd0c6706901bb61
SHA5123df191823e35d35dead5245e9584c14b5d832d7afe631ce71f31dd41180c84dd338cdb66650a52d6d6405cdd3cb8fce099f72851ae894fe3e38f7cc33163d5ff
-
Filesize
252KB
MD55ebd2877c5e73202aeb9f7b6caea5597
SHA1a2707deb42330d989d1751f91a79f78eaedc4583
SHA25694ade6c3dbdb49d27ad0e774ead65edbbb818973bae85226eccff1cdce6ac708
SHA51214064d6cd971eacc2257380ece65a991e66207c94cddac9ee77f70d8c8a058d95f4368d6b055bb94bef6e644f5a49eb8adb119369ff8ef8c24a247c635435fa5
-
Filesize
252KB
MD5404aeb2a03673e74474f645f37439a75
SHA14023d98b45bb85f69e8aba8fc6a343f7240a47a0
SHA2565958077bb9b846c90c6fe6f40fa5b513621fbfc88707db5169d11b2e33a159c5
SHA512913e4cdd140d4d008452f44dc0aa9054913daf25eb5062093e58fe935394cde75fff0be59acb687acfba401d1499cb7d129b56288b1d0e0a815058210fd206e5
-
Filesize
272KB
MD5e70d48dd5d01784f181b7f97624807a0
SHA12fbfd49f8f5a1a5ddde580faa0a4690a43f2026b
SHA256d3a0b61b0eca4af79218661ce4edcef57446fc51ecbf6b199b1c2d736b18a982
SHA5125880c9b453fd97b9aefcf3f6df9529537bfbd37a25d5bd715b839430d15ae766157bc45eb7a2e753b8f0c163ab3ab9fb91e652e90fa626f1d6b5bb426556c347
-
Filesize
91KB
MD52b681a8190968bae3c9ffcbadd0a256b
SHA158e3767944e85ddb3011e92e1ca882ffef19fdca
SHA2569784cf08773a500bc16f4810424b200192a7fb7ea42a37cc2b4eba6e4eefb0f4
SHA512c87ce135a45e7a1e254c89ea478f68a87ebd7a3a72ed4cb308364fe4c7bc18e0342408c1c693910c502a94c37f2ea72e4e17df14ab0e52789389cd42a67b70e1
-
Filesize
88KB
MD5e19ba4ee55447b458689cb4addf1a9c6
SHA1558adb54690d31580375ff6454dd97118818ae93
SHA25686d9ffa06a5e867a4914c043548f3be07040241da03e2d2df3313417833793f6
SHA51242a01fcb982c203ad01214ae9135e6d5836e23f44ee326c71b737021daa0119ace379b036b47dd9e0528b5b72956451344b0d2d194914c1cb2fa030fee036010