Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-05-2024 09:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://checkout.verified.eu/checkout/?u=%2Fenvelopes%2FHkxm6vbMEA%2Frecipients%2FH1G_-uZzNA&lang=sv_SE&redirect_to=http%3A%2F%2Fweareera.com%2F&access_token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.kFzcTR_QQ1lIiZJtkUTGHSA1fmjgmwRAyjhXyW0oOzZNTWyzeKnwC3b4km3vmrZaayXDsAS6DUlJzoT1TMB7I0pmoIqbgEj_0D1_7alml-ZU_sitXcjoONtDSp0SiKE_yig95tRieEY_4NKgNPsz2z0UGWd53XUaVIRwOACVX8mofsrV8ivL5dae3lx3GZ9pcI51O-QwAAs6T7smFLJpjar6gbOjgwGVwAHv7WcV7IFArgYeSp8nR9OxJXOiE_3AuJCqPloGHR1Bm5sQ2avGb_PvvK6BuSp6tA4M3uxDzFexJKS7v4UPF_naqLmEWFaz0ba05HdCJEirYik3LjDXWA
Resource
win10-20240404-en
General
-
Target
https://checkout.verified.eu/checkout/?u=%2Fenvelopes%2FHkxm6vbMEA%2Frecipients%2FH1G_-uZzNA&lang=sv_SE&redirect_to=http%3A%2F%2Fweareera.com%2F&access_token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.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.kFzcTR_QQ1lIiZJtkUTGHSA1fmjgmwRAyjhXyW0oOzZNTWyzeKnwC3b4km3vmrZaayXDsAS6DUlJzoT1TMB7I0pmoIqbgEj_0D1_7alml-ZU_sitXcjoONtDSp0SiKE_yig95tRieEY_4NKgNPsz2z0UGWd53XUaVIRwOACVX8mofsrV8ivL5dae3lx3GZ9pcI51O-QwAAs6T7smFLJpjar6gbOjgwGVwAHv7WcV7IFArgYeSp8nR9OxJXOiE_3AuJCqPloGHR1Bm5sQ2avGb_PvvK6BuSp6tA4M3uxDzFexJKS7v4UPF_naqLmEWFaz0ba05HdCJEirYik3LjDXWA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133615342526449115" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 516 chrome.exe 516 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe Token: SeShutdownPrivilege 4888 chrome.exe Token: SeCreatePagefilePrivilege 4888 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe 4888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3572 4888 chrome.exe 73 PID 4888 wrote to memory of 3572 4888 chrome.exe 73 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 1512 4888 chrome.exe 75 PID 4888 wrote to memory of 2968 4888 chrome.exe 76 PID 4888 wrote to memory of 2968 4888 chrome.exe 76 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77 PID 4888 wrote to memory of 652 4888 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://checkout.verified.eu/checkout/?u=%2Fenvelopes%2FHkxm6vbMEA%2Frecipients%2FH1G_-uZzNA&lang=sv_SE&redirect_to=http%3A%2F%2Fweareera.com%2F&access_token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOnsidWlkIjoiL2VudmVsb3Blcy9Ia3htNnZiTUVBL3JlY2lwaWVudHMvSDFHXy11WnpOQSIsImZhbWlseU5hbWUiOiJLbGFtbWluZyIsImdpdmVuTmFtZSI6Ik1hcmN1cyIsImVtYWlsIjoibWFyY3VzLmtsYW1taW5nQHdlYXJlZXJhLmNvbSIsIm5hbWVzcGFjZSI6Ii9lbnZlbG9wZXMvSGt4bTZ2Yk1FQSJ9LCJqdGkiOiJIMUdfLXVaek5BLXNpdm12dyIsImlhdCI6MTcxNjk4NjAxMiwicm9sZXMiOlsiL3JvbGVzL3NpZ25hdG9yeSIsIi9yb2xlcy9zaWduYXRvcnkvZW52ZWxvcGVzL0hreG02dmJNRUEiXSwicGVybXMiOlt7ImFjdGlvbnMiOlsiR0VUIl0sInJlc291cmNlIjoiXigoL3F1ZXJ5KT8pL2VudmVsb3Blcy9Ia3htNnZiTUVBIn0seyJhY3Rpb25zIjpbIkdFVCJdLCJyZXNvdXJjZSI6Il4vY29tcGFuaWVzL3JrZzBXMU9kbS9mZWF0dXJlcy9zZXR0aW5ncyJ9LHsiYWN0aW9ucyI6WyJQVVQiXSwicmVzb3VyY2UiOiJeL2VudmVsb3Blcy9Ia3htNnZiTUVBL3JlY2lwaWVudHMvSDFHXy11WnpOQSJ9LHsiYWN0aW9ucyI6WyJQT1NUIl0sInJlc291cmNlIjoiXi9lbnZlbG9wZXMvSGt4bTZ2Yk1FQS9kb2N1bWVudHMvW14vXSsvc2lnbmF0b3JpZXMvSDFHXy11WnpOQS9zaWduYXR1cmUifSx7ImFjdGlvbnMiOlsiUE9TVCJdLCJyZXNvdXJjZSI6Il4vZmVlZGJhY2svbmV3In1dLCJleHAiOjE3MjQ3NjIwMTJ9.kFzcTR_QQ1lIiZJtkUTGHSA1fmjgmwRAyjhXyW0oOzZNTWyzeKnwC3b4km3vmrZaayXDsAS6DUlJzoT1TMB7I0pmoIqbgEj_0D1_7alml-ZU_sitXcjoONtDSp0SiKE_yig95tRieEY_4NKgNPsz2z0UGWd53XUaVIRwOACVX8mofsrV8ivL5dae3lx3GZ9pcI51O-QwAAs6T7smFLJpjar6gbOjgwGVwAHv7WcV7IFArgYeSp8nR9OxJXOiE_3AuJCqPloGHR1Bm5sQ2avGb_PvvK6BuSp6tA4M3uxDzFexJKS7v4UPF_naqLmEWFaz0ba05HdCJEirYik3LjDXWA1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff844799758,0x7ff844799768,0x7ff8447997782⤵PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:22⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2796 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2804 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:12⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:82⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4960 --field-trial-handle=1692,i,16429948311413260131,11149621619518512104,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5a3a79dbb105ab3012bac35586b0ad6c3
SHA1c7ba89a72877cea279ca81675b3d611837b1279c
SHA25618e4b7102fe83d66c582bf7bf6d9281622ab64ad8625e76fd7eb897e1e427609
SHA512fd801a9dd792d5479cf89e36568f3bf312441232c8c943a2f5337b5ecc203119de5188f3b5e1f978e604448baab37417597f070ccc45cc13b1a91413399f2e3e
-
Filesize
1KB
MD5d8f7ea234b4b3241c797af6ec46d5929
SHA1e102ecdf7d677d957465b8daecbd0aa977274861
SHA2564a363e0314fc0e7a0d021c1ea78ef80fd434628e04099dee4c2278aee920c808
SHA512b35df9f79815e8351d70c6372adf181199666f53880613e10c52272ce3ecbe5ae053cb984dae72d99ee11a3a1018616b8a4341fdfe306dc77b767c8e7e5d5191
-
Filesize
1KB
MD5e9174cda101aeaf78e76996b48398465
SHA1b3a4affa44faf980faadabd55c3a1dc48ce00f93
SHA256f6b6744275c71ac06581f7a9be1118ab41a92c9d20635d845f9c53bd2ec27d34
SHA512c38e3c82e8d12357ce0e0de0c226e7af65a431056c82a39745d8ec5562fa83e1255f3e5272c3d8bae7eb8b362e3fd98964f863bc673fcfa39aa0539534b6a158
-
Filesize
6KB
MD5b008b8791d87e800005b58adacdbf0a4
SHA1d51fef30a58446f477585a7453195488091cbbfb
SHA256d067256e7c28230883034b2106d2a2a1c1b551301d7ede32be74d1527c20f1fc
SHA5128275eea5a6ab2aec54d3081f5d90830053d7f2b86e4bedf01c818305d00b82b4e7e3745917daefc884a0a09e6abb6c61223924fc31c0886cc5511b7cc4150011
-
Filesize
6KB
MD57728bde6548e4f9adcfb9335a8e9c6f5
SHA1ff62cccae76f4ce87d3a2eeffd277bcc3588b683
SHA256e87ba342f1447f63358f78e5e14b51db72b0e116b7524e40cb457c2dc7b978a9
SHA512ed78b0858020280f68f3485cac5bbd557d0e1f6997276bd1ae9eec2dc881e3b20d7d2ea4e0bef81007e45b6a4bced64c10f86f6de31303eec863bb8ac22ec780
-
Filesize
6KB
MD5bb47f737f572487100f678e7267dbc6b
SHA16d709d1a2edc8846a79942a650e96f6782e27615
SHA25656bdacf3060fb6f384d12a182972753834458ddbe631b0d755aa05b546056001
SHA512d15742335c9cca5b7e428fe10cdf83cb4556e744a6d2298a4ae353f62609c7969d67b0e82c0380a566dd625f486513f862fc20f8d1bfa054cf4b6cd996491a09
-
Filesize
136KB
MD5dd78190e17c372cadd0818c3554fdb00
SHA1bb9a09cf060937b6c001de54df0b6e91b0da2e86
SHA2565d6f219f4d58a4d5575aceff56c0ab1c1124ca5b770ca53e83f4f440a2855110
SHA51290e5d4bd07da5b980cd4aa908f450efc0f7f7db34751913a4aac17bc7edd4a19d0c0a429dac69ce3d7ebd93fb035f9ec5cc826a8ad69e50c28b5263ae1466dca
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd