Analysis
-
max time kernel
299s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 20:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ci5.googleusercontent.com/proxy/mTbuSiNrq18m1eR99HQVdgQL852S5KnW1Cy8iD39qJuAUsFsSUohvJ0ZTohQzZRSsiHo7-DweTRNumViQFtpAy4tYg2leP06oroMIsFapp2l9MNR9kZwLiefub3EevLSRdpGcXTmOTi5BYuk7Q1_GpXVVP6pVCttmOKwJ866Dg=s0-d-e1-ft#https://www.aexp-static.com/online/myca/shared/summary/cardasset/images/NUS000000245_160x101_STRAIGHT_96.jpg
Resource
win10v2004-20240508-en
General
-
Target
https://ci5.googleusercontent.com/proxy/mTbuSiNrq18m1eR99HQVdgQL852S5KnW1Cy8iD39qJuAUsFsSUohvJ0ZTohQzZRSsiHo7-DweTRNumViQFtpAy4tYg2leP06oroMIsFapp2l9MNR9kZwLiefub3EevLSRdpGcXTmOTi5BYuk7Q1_GpXVVP6pVCttmOKwJ866Dg=s0-d-e1-ft#https://www.aexp-static.com/online/myca/shared/summary/cardasset/images/NUS000000245_160x101_STRAIGHT_96.jpg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609711311170514" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 3492 chrome.exe 3492 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 228 chrome.exe 228 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe Token: SeShutdownPrivilege 228 chrome.exe Token: SeCreatePagefilePrivilege 228 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe 228 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 1072 228 chrome.exe 83 PID 228 wrote to memory of 1072 228 chrome.exe 83 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 3304 228 chrome.exe 84 PID 228 wrote to memory of 2688 228 chrome.exe 85 PID 228 wrote to memory of 2688 228 chrome.exe 85 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86 PID 228 wrote to memory of 3132 228 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ci5.googleusercontent.com/proxy/mTbuSiNrq18m1eR99HQVdgQL852S5KnW1Cy8iD39qJuAUsFsSUohvJ0ZTohQzZRSsiHo7-DweTRNumViQFtpAy4tYg2leP06oroMIsFapp2l9MNR9kZwLiefub3EevLSRdpGcXTmOTi5BYuk7Q1_GpXVVP6pVCttmOKwJ866Dg=s0-d-e1-ft#https://www.aexp-static.com/online/myca/shared/summary/cardasset/images/NUS000000245_160x101_STRAIGHT_96.jpg1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6493ab58,0x7ffb6493ab68,0x7ffb6493ab782⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:22⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2280 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4416 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:1424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4864 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3924 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 --field-trial-handle=1952,i,14387389384766569972,2977334792702683960,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD50466d8b8e0e52d32e4e6c54c77af6794
SHA14aa13fe630f84b463fa21a06dbe6ce3ea3b7e710
SHA256535a9032e3d12541a28b71590057704bddafcf794a8a2938847c88222c3b6811
SHA51276cc25d1aedae2967a96b3ec1bace36fb7655be0be5bdcd72d548d2f9e2323793882b83a2bc2e5a54349680075c4ec9f3d07f0ea8104ba93d3a97c37f7bd15e4
-
Filesize
1KB
MD5e40ecc0b3c5d52017caeec768301c1d7
SHA16270764147d4441747aa38ebe1d47d88c15a8284
SHA256177024fa784824e3e50a0a118f63fff17c739f638110073e776f5b62917123bb
SHA5121671f070ee4b5070c86a5ac00c1938d632c447179797d4df750aac262624922823cb381d57b8109a1420beac1bef95a1e46686fe11aeefa52a35a39b8fa4691c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD57c85effab3da1753d452ee5557b78517
SHA14dac5bd9e544609b7afc991f5000f8ff8c8eaee2
SHA256f121820a9244369adf7891133b18a381f573df3bd724b82d0fb5f63942117e14
SHA51282bf47a91699f107fba97377781d41ccee584c48056837bb08bb3bf8e4606f7c6314f3cb54bf0877acbdaa4ffdd02e7a07778664cc95c5ec92e50c38748c28a7
-
Filesize
278KB
MD5254875873dd6cd6e896c396046bd5518
SHA1426cfdb159ecbdf69078114a0f71b10efed91fa0
SHA2563ed1a42db3b10696444c98e2485dd942abc793c086650285c834118098b7e2b2
SHA512039cb50a9bfd4c73669d793dd83b7aa21b38387172310d23b230d7d6ece806e953b4ffeb7017779848c04471069d00f57a3b5cc02a832799b4f19d1dd7311708
-
Filesize
257KB
MD5d13063795ce1ada6943698a2d30c4489
SHA16384e3c1c0e56ce53c948a1203cc01107d0a46a7
SHA25654d21c55ef83841fe01fcc010a9c2dfcca6e678ae1d0b723e918c51d2ad8673a
SHA512ad72c688a63ca17e0bde374e4cd9041d8735f646a55f3b7c7a1ad69a93d4c9c72cf82edab7fd4d6f65f051735d6a223364923a6a1ea8145ec4d51f3b4ff09f57
-
Filesize
257KB
MD5d4d4b55969a9661fad275163d2e8076d
SHA14c3ba12da0e08d64a51ba644336e42958bab6436
SHA256b0c7c60ea11a917a6d1ffdbdd5544d485586d105af3006348226e81b91c0662f
SHA5123663e1b611392737b5aa16150de7e158fbda4e4b3e9410401c2beee8c87c9c32188b2fede2cf8e709ce582d3f3ba4af72e05cc47b2cd6fb703a6e1bf54507f74
-
Filesize
257KB
MD591440bf43df2ca2157f6a60f041e5da6
SHA1530238999d4fd86912d61ade5f385b200afb87bd
SHA256a14956c938e0989e9e2050fac0e87296d8a0ffb9408c0b547b1ae955b9523d8e
SHA5129abc9495ba7ab438e9fe6f131720ceb6b2d8f8c6b4bb2e24b57be7da2e16e280bb2cf8340dcadc56aa95cfa3b2a7cf02f362f40b3a1e14d322705fcaa49ab902
-
Filesize
97KB
MD54bc0e9817f434efdb694678730958099
SHA197ab9cf8a1e90f068946999763bed5d9dca314e0
SHA2568238237328b45f894536112c0b2c3c3d4f4ec96c6b60042814775e2edf44386f
SHA512d090b7d66acc2bff74b179e6b3bf3769e7550abee6ffe125472526c2dfedf640a24b5a70963ad905d884d6f8ef5e9a313289f032bba73f4cb10ccb7097b18f1f
-
Filesize
94KB
MD55e0b372762d58aea965efd438f831e4d
SHA1457d2c263d914cb53292f741a3f7e0eed9fc3f0a
SHA2561b4eab94e4d57e88fa7de8c1c22802a3443d895e9a7f726da6eefd6e15fe05bb
SHA51227177735a56d2226793c70208293c28e17d3e9c525bf37359feeb35b2e008086b93a5c762c71d6913092b44bc76a53a56c49ac6c74565fdf32e4ee0df993717f