Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 03:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://expensive-shii-s-school.teachable.com/p/admin
Resource
win10v2004-20240508-en
General
-
Target
https://expensive-shii-s-school.teachable.com/p/admin
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133618604554443884" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe Token: SeShutdownPrivilege 884 chrome.exe Token: SeCreatePagefilePrivilege 884 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe 884 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 3456 884 chrome.exe 83 PID 884 wrote to memory of 3456 884 chrome.exe 83 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 2256 884 chrome.exe 84 PID 884 wrote to memory of 968 884 chrome.exe 85 PID 884 wrote to memory of 968 884 chrome.exe 85 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86 PID 884 wrote to memory of 4024 884 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://expensive-shii-s-school.teachable.com/p/admin1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956edab58,0x7ff956edab68,0x7ff956edab782⤵PID:3456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:22⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2288 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:12⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:12⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4328 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4856 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:12⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4060 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5552 --field-trial-handle=1916,i,14827540325436451735,16212014845545973367,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696B
MD5380b815dc5cc36078aef63e2a6d74fe9
SHA1eb1b28010c5d2175b8a497414cf4a958d237730b
SHA256eaba52a560aafd1ed3334a8dc9e635a032b7ac31855b2ef4acd650fd584adc1d
SHA512c77c1217783045b2aad4ede482a8dbf8ea461fc2eeed1e07166a6a46badc26f417c7d7120dcaf13150d8421c5576ed13b3295a75100df85a4d0810a264ee49ea
-
Filesize
5KB
MD58481c8b0853309cff41ca204eaf30cd5
SHA1eb1f3f4c0623e99a9e0ab80cec58eb1f662d89e6
SHA2563572b9d9459771e6b5f25a9b2aad027d8aa64b4f22140a94f050085697f46693
SHA512b80ff4594c1b73c70948ff5296ce199ed23bd68f23856c1d58a396ae7f5dfdd64bbd368ae1a4dd51d413869ee3c135dc32ec7c1f5df28d377ffa088eb9f8a034
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5412cd288c2e70a102c318d62f44b3465
SHA1b47f857f02c4a8ccff8c146774069ec4f355ae02
SHA2567305950da24f0041f8d0f734ae787fd96ab4de3d9ecf9988ad57c7f805ebdc69
SHA5127a0c9b7e5c8ecbfd582db6ccd7c879d91ef5e6f1b90445325e98c7b16ad12db365040da2ba54b43ba53f5d84fb2d94a4f16e934122e54665a7430f3d2966d047
-
Filesize
7KB
MD5a24cbd2bd94f1a7fb0f153e5280d6975
SHA1a44dfc34b8c355684ef79f79cf79913763a9c535
SHA2566739d529d333dac89d6ec6ae7c1a915cf965e0f9d1dfe91df16ea723e73c4cdb
SHA512e8782fc7f86f01a56eabe50adbdfc3e73f6cc8783a0c6826fd5f8574f642bcacd320498b6a74625db2f6cf314758502a6a79cccb28d2549193cc4f87485afdc3
-
Filesize
257KB
MD5af0f6c5ddf24366491a6a616c408889c
SHA18f3aec362ab51cd7263b4870d519a586824567ab
SHA25657c291e50c22d7bf44275bc0a3edec0caeb10bcb86c0e78ea308efa3a9979902
SHA512564d46b52305ff19d6a779a01b4776d116f56e335332f80b366d81a4c43a3d41ceb267e0b3baf5b7964d21e56f74948b28ce3f0932319670fcd970534fdf9321
-
Filesize
257KB
MD577a30fc90215b8a824fb3165811e092d
SHA1d6229258ebb4eeb7383603a2c7dde69349796437
SHA25618b121d1898c86b64988a8bf845ba9da0a64e92d490494811b79a6b2b2f512bd
SHA5120b39e2d15778af52b4c5daaae1e50cb65ffc28c355d5867e01aff4bd4894feb303ab00db34be2f6ace367f98b10b2e2cd7f16165f3efc4e915ba9baf117ec304
-
Filesize
257KB
MD583aa0636c2399ffad664d9491376e1b8
SHA1a4b62ca6057976d620fc046b02ab05aacafa4ce4
SHA25644e1bd2056c29951c21e10e58f9c84c1641b5ca2ab81c59053399eae06a2e20c
SHA512bbe716ff674977261ffc168c7556f1b48f8b2a4268f5771dfa58d48628709e67febac30a112fb31e40ba805022349afa8b49afdd7c1d1652384ec57776364a4c
-
Filesize
277KB
MD58915b97076cd41e456aed9ad6b10bcad
SHA1a4aa90121f63d489ebbcfaa3a3d8dfd5f4eca0af
SHA256f5486fef438c76107d1aca3ad970e3b84666a0229dee56f74559579690daada4
SHA5120a93c615d38b2175528416bfd10db3821a9d03afbe5485be705b73f25384f925db382045d8e2bf334be5ab6a789e64b145a30fc364fd19e03a8e95413bcc6f92
-
Filesize
94KB
MD5d0909817e446d2e01875f707a1ea651c
SHA1b9ccf2a843b8c53c5995e151b691d1228f2e82a5
SHA25688e208f711c93b05582131d7805727486afa8d0e540d450a140fe5ad64f84d7c
SHA512c75468db2461705d4ba664776aa84025e0f31e189a0a0d3b15244e7f5c39379fec95212f297f43d14f223263199dba2c2f99783b41bf9cbc9d373fbfb74ae4f9
-
Filesize
91KB
MD52c7613ff0e5e6737d3f4f06d95523d95
SHA106255fa9ba1eba337ab152ddf4ccc0fbff1724ec
SHA256151520f8d8f4eb941e34b3d367d3c653bc71552ed4b76fd43ce6b794963dd410
SHA51241691c738034949314472b901c05c6eb05932d10154dff0dc27169c72f1c5ec219a1be5928e70a11d78325537ed5f39cda15c35abacfa89e61e6e933127ddf2a