Overview
overview
7Static
static
7vivitar/Setup.exe
windows10-1703-x64
7vivitar/runsetup.exe
windows10-1703-x64
1vivitar/st...g.html
windows10-1703-x64
1vivitar/st...t.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...a.html
windows10-1703-x64
1vivitar/st...P.html
windows10-1703-x64
1vivitar/st...g.html
windows10-1703-x64
1vivitar/st...t.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...a.html
windows10-1703-x64
1vivitar/st...P.html
windows10-1703-x64
1vivitar/st...g.html
windows10-1703-x64
1vivitar/st...t.html
windows10-1703-x64
1vivitar/st...g.html
windows10-1703-x64
1vivitar/st...t.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...P.html
windows10-1703-x64
1vivitar/st...g.html
windows10-1703-x64
1vivitar/st...t.html
windows10-1703-x64
1vivitar/st...a.html
windows10-1703-x64
1vivitar/st...P.html
windows10-1703-x64
1vivitar/st...g.html
windows10-1703-x64
1vivitar/st...t.html
windows10-1703-x64
1vivitar/st...h.html
windows10-1703-x64
1vivitar/st...a.html
windows10-1703-x64
1vivitar/st...P.html
windows10-1703-x64
1vivitar/st...e.html
windows10-1703-x64
1vivitar/st...l.html
windows10-1703-x64
1Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-04-2024 01:05
Behavioral task
behavioral1
Sample
vivitar/Setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
vivitar/runsetup.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
vivitar/startup/data/de/loading.html
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
vivitar/startup/data/de/nointernet.html
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
vivitar/startup/data/de/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
vivitar/startup/data/de/tutorial_Vista.html
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
vivitar/startup/data/de/tutorial_XP.html
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
vivitar/startup/data/el/loading.html
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
vivitar/startup/data/el/nointernet.html
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
vivitar/startup/data/el/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
vivitar/startup/data/el/tutorial_Vista.html
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
vivitar/startup/data/el/tutorial_XP.html
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
vivitar/startup/data/en/loading.html
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
vivitar/startup/data/en/nointernet.html
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
vivitar/startup/data/es/loading.html
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
vivitar/startup/data/es/nointernet.html
Resource
win10-20240404-en
Behavioral task
behavioral17
Sample
vivitar/startup/data/es/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral18
Sample
vivitar/startup/data/fr/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
vivitar/startup/data/nl/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral20
Sample
vivitar/startup/data/pt/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral21
Sample
vivitar/startup/data/pt/tutorial_XP.html
Resource
win10-20240404-en
Behavioral task
behavioral22
Sample
vivitar/startup/data/ru/loading.html
Resource
win10-20240404-en
Behavioral task
behavioral23
Sample
vivitar/startup/data/ru/nointernet.html
Resource
win10-20240404-en
Behavioral task
behavioral24
Sample
vivitar/startup/data/ru/tutorial_Vista.html
Resource
win10-20240404-en
Behavioral task
behavioral25
Sample
vivitar/startup/data/ru/tutorial_XP.html
Resource
win10-20240404-en
Behavioral task
behavioral26
Sample
vivitar/startup/data/tr/loading.html
Resource
win10-20240404-en
Behavioral task
behavioral27
Sample
vivitar/startup/data/tr/nointernet.html
Resource
win10-20240404-en
Behavioral task
behavioral28
Sample
vivitar/startup/data/tr/tutorial_Macintosh.html
Resource
win10-20240404-en
Behavioral task
behavioral29
Sample
vivitar/startup/data/tr/tutorial_Vista.html
Resource
win10-20240404-en
Behavioral task
behavioral30
Sample
vivitar/startup/data/tr/tutorial_XP.html
Resource
win10-20240404-en
Behavioral task
behavioral31
Sample
vivitar/startup/flash_detector_de.html
Resource
win10-20240404-en
Behavioral task
behavioral32
Sample
vivitar/startup/flash_detector_el.html
Resource
win10-20240404-en
General
-
Target
vivitar/startup/data/de/loading.html
-
Size
790B
-
MD5
528bb090d15e4e8607387f2d2d111597
-
SHA1
dfd43b532bba20e72d882339fe3384f66e4699a5
-
SHA256
0be527a67d43790ba8bb3b0555b787830224202d8712ab8b7a4d5a3ad3172c5e
-
SHA512
620d86c4cad2248c0cf207879536d56cf5dfa59a393b05ab81eccb484c82c9a0efcb623fc143d11a270682f6ed49ebfa2bdcdc234f0d9709877763e45458987a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133589127728516848" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 988 chrome.exe 988 chrome.exe 1904 chrome.exe 1904 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 988 chrome.exe 988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe Token: SeShutdownPrivilege 988 chrome.exe Token: SeCreatePagefilePrivilege 988 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe 988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 988 wrote to memory of 4988 988 chrome.exe 73 PID 988 wrote to memory of 4988 988 chrome.exe 73 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 5088 988 chrome.exe 75 PID 988 wrote to memory of 4976 988 chrome.exe 76 PID 988 wrote to memory of 4976 988 chrome.exe 76 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77 PID 988 wrote to memory of 168 988 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\vivitar\startup\data\de\loading.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe39159758,0x7ffe39159768,0x7ffe391597782⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:22⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1772 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1964 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:82⤵PID:168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:12⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2860 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4116 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2560 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1828,i,6692757735218148436,267376275766818465,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5cf8f66e407f7a2c2d5a3bbc0450f2304
SHA1e4e699d138e245c5d66b999e53ff7bec7a559c43
SHA256ef016b31a2db143c4f5f9aa9c82dc4bc243a592d015fc160e93ca919d38b65aa
SHA512cae47fe933a0263595612ebc86b0dbece954242f5232584d799948a503ae0ade23e9b23e97e2fce7a92f750619aad8e7f07254ba4a514ef3c9f0c0eb334522f3
-
Filesize
5KB
MD5d55bb0e2156eb4ee532831c1195b4e21
SHA19766e8a62bad6c0cb5b7f26e16f27bd3c9170cdf
SHA2563f628b2ab383d361a4f05307c4c303fb7ec315952c6ed6cbe8a7e156df5e4345
SHA51241008bf323d576ccbbf2e66c9b0b4190906ec1771a3f36c82088e4be75b508eb770f7dcee3895a3aad831b1bb5c227ee012a1047cb6928f18de8ee48a37e8260
-
Filesize
5KB
MD598b5a1263b39c4ff360b14bde715d0fd
SHA1cc86b75df1db024ade184c68958641480ebd7ee7
SHA256f62ee1b039d780d8c4c37ed813eb81a2151a68b56db80d96715def7422965b0b
SHA512f191947759c3552ee1ac469414ea2f392b787fbc52667a1b03b028e18e5929106f9347e57273efd2af093fefb8e390302fff3b54a918c16931f3b5917d72c939
-
Filesize
136KB
MD59aabf28d3dcaac6b4e9e843ec2b6a63b
SHA14ca6284d8056ad08870408af3582962f2a433010
SHA256e12dc4aae22bd71fcc118b9260af42affda5f5d7bc76c72bfe729484160028de
SHA5128f3231bd69cbf01ad56390b105b851424ee7bb7959d7073d85c4aa85129fc4a0ef83435658b68442a43f43bf1e595b0ec206af36dbd065c1bbe094c2ada18b96
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd