Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
templ.txt
Resource
win10v2004-20240426-en
General
-
Target
templ.txt
-
Size
113B
-
MD5
f0db452208152351fe13320e5432b5ca
-
SHA1
95a98ef45ba0015ba4db38ba92996d5b4667c11c
-
SHA256
fb292a5091e08ee6958a875f73cf30b44ed36d2f40d6098a28979835d8d03b23
-
SHA512
73a7f9e472ab85be11b3681dfb6e2ea986b4514a0e4f517011ee15633dbaf9fbac13f67f4c53f0efe99f253ffd7282007978e49f4da1f8deeb201a5b7f8a633f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133606886770061066" chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2800 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 436 chrome.exe 436 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4924 4156 chrome.exe 92 PID 4156 wrote to memory of 4924 4156 chrome.exe 92 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 5024 4156 chrome.exe 93 PID 4156 wrote to memory of 1968 4156 chrome.exe 94 PID 4156 wrote to memory of 1968 4156 chrome.exe 94 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95 PID 4156 wrote to memory of 4508 4156 chrome.exe 95
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\templ.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc110eab58,0x7ffc110eab68,0x7ffc110eab782⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:22⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:12⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4332 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4548 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4656 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4736 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4824 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2764 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3144 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4784 --field-trial-handle=1900,i,5064081984256265999,9666143199865962529,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD5642e7a57c626c3623be6e3dfa625ab1f
SHA11c484a5b38d1c78ff986dfc6a525db62972b2c58
SHA2564106c1cde84b746849d8be1d1e58546528cb916d52e12930b422a0be75a39f50
SHA5125e04ea8959eeb919999e0501551310dfb4984f862e877377a3d9966f817724131beabf68051647a7aed87cb88c8b2b30b373c4ced8c8b5c1ff7c3a2a72fc15e6
-
Filesize
4KB
MD5fff0190959080e8d13dead9a0505485c
SHA108ed14e44159e00b8e36dcf4fff4d19e1bab1647
SHA256cb488d789f7a4f8366bdf62aa3af497b5c932bbe592efc625d9337957ea0df68
SHA5126aa1e21f6aca8550e2ae176c9012a27ced6855abcbc3a68c178440d118e5b140ad568f80afd3e66b1e4098c569ae856cffdb03d0a45cf580292bbfef4c853dd9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD55c891511d68f957ebeeb9d6c43d6bda0
SHA1cfc15274c3b0240a20885b5dac96e0b20337c70d
SHA25691aba60504f18fc22d5dbcc7dd95196d9585b90c2a0c0afbc8d405b36ef48e15
SHA5126351780ac4cedc82f671a81dc9f560c9142b4478d19f08fdde54538ff686a1b6c57d0fc4a60e9057822c6a4679788608af72ecf9522bbd5bea2b618d0d75a074
-
Filesize
6KB
MD57eed570cb462a0a44ac75b46f06783e8
SHA129bdc6015329662d616cb9e447a56da3fee9a608
SHA2568433fa9e0830972a28d9530810858da8ab481e677db8d739ec6dc83b4f3826d8
SHA51281f0adff367ed2fa5099719314a88ae30892ec7fb33ad431dc10bd4e2c9cd27900fb38f37f97067abae172135b5c7b7ccaa2e2ead4b59d5ac61da0c841399bb3
-
Filesize
7KB
MD5ff2fb7804c2e54f4bb6024095ce7e1a2
SHA15e64d5402b143b733f831b0bf6994ab8898c7588
SHA256db99e7271901c7011ad7525a72864732f305b4101a09406851fdfaa4093fc706
SHA512e373ccbb67bc194c36f0bcf161a818107977fec01d21f22535751049f4f2c0fc68afd49d1006788f5758cd95a5503751c929225f635ce56b07e57e51588998e7
-
Filesize
16KB
MD51b6458d6e3eee8ae385c3ce0afb59ab5
SHA15c1ec4219b7986084e669c1f35bcc0e6b09e552f
SHA256f475f58b58acc7715f4241f54e19c8248d546f197c7a2a3c03a9eb66e1a37748
SHA5128f41d0d7fc2d8031c73f1ccd1c9b69241ffdf93fbdf150232e2e44c81738af3ef1d5c9510efcfd4bef9e49f638ee1e0267fefa2739d4db5257c54ba16f33df38
-
Filesize
260KB
MD553d25b180d293489416842effc288bd9
SHA11ee5bbfbad9d8fd734a537e23a9f0f3fe07a43eb
SHA256a4e078f986d5d81aaa78cb8e9da649fdd340d0342a8768eb99a37646825abf0e
SHA5129101175fa5ea32a7337c12f84227ed37a54becf99ba1202bb0f8a72cc8530df72f9b96364e780fa698c0d7b5a8bf9ae49fa96b0acd6c49ef75565bc014af315b
-
Filesize
260KB
MD50802242188e373ea274244e74621e189
SHA1fe4f728c897cb9b835fc85b55b80f64209cfe8ef
SHA25620f47f7c590face53911ca94cbce534062dd281e629fd1d0dc90f92d20b9e0d0
SHA51265c527c335373911ce620bbc6358d073883a523b6827736be482baf4108e3d75d1d001e28815475841036087c74e7b4ef838dcfcadbdb9accb9339f16908d183