Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 20:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://na2.docusign.net/Signing/EmailStart.aspx?a=b4d125e9-861a-4b07-a7fd-b7fb4170bbf4&acct=cf9396d7-f480-4d91-8bce-f0dd4cfe4ab0&er=61a92667-c646-4825-9d6c-42e1523297f8
Resource
win10v2004-20240508-en
General
-
Target
https://na2.docusign.net/Signing/EmailStart.aspx?a=b4d125e9-861a-4b07-a7fd-b7fb4170bbf4&acct=cf9396d7-f480-4d91-8bce-f0dd4cfe4ab0&er=61a92667-c646-4825-9d6c-42e1523297f8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620921842473049" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe Token: SeShutdownPrivilege 4528 chrome.exe Token: SeCreatePagefilePrivilege 4528 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe 4528 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4528 wrote to memory of 388 4528 chrome.exe 83 PID 4528 wrote to memory of 388 4528 chrome.exe 83 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 3592 4528 chrome.exe 84 PID 4528 wrote to memory of 1696 4528 chrome.exe 85 PID 4528 wrote to memory of 1696 4528 chrome.exe 85 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86 PID 4528 wrote to memory of 4840 4528 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://na2.docusign.net/Signing/EmailStart.aspx?a=b4d125e9-861a-4b07-a7fd-b7fb4170bbf4&acct=cf9396d7-f480-4d91-8bce-f0dd4cfe4ab0&er=61a92667-c646-4825-9d6c-42e1523297f81⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc65eab58,0x7ffdc65eab68,0x7ffdc65eab782⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1624 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:22⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2960 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2988 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4048 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4556 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4204 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4636 --field-trial-handle=2080,i,9039701177727672140,18188733935141232960,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257KB
MD5f6bc96d94cd1b5a79a2d407a03768d92
SHA19159688616f2915ff21c3ef10d02ff2786de1eb8
SHA2563502479dbb49bf2098e2901d320186e9730f08226902c7cb19c38b360e8c0036
SHA512d09048af822a7a22c85260069f5dad7fe3ad3db73af789472b5f9c764ef6feb95a6cc71ef99262b50255ceff82362abd8f19c842db762849f193ad6e1b0eadb4
-
Filesize
96B
MD545283c4b9a04e6610b5a307f4bda3101
SHA1630068fdd7c45df7287c80655f541cf1ab1fbdf3
SHA25626c9fc9cd7767e4494fc63fa95345304735a891f5e5f918da6ecaf8be76289f3
SHA512360498383d5bfb05fb908d844651e26a946e76ad51701be4d7c973e154c6a310c5bb4ddcf940e4550da6f32a12c8861254bd168fc2dad6e39ab6e43f37f63dd1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\0a581a2d-805b-4d08-b8c1-06db2ff87a28.tmp
Filesize1KB
MD5febbf871f82870209dba88c11f0cb6fa
SHA13ba3c3506ad7c6b95f7533273ab8b791ae792bad
SHA2561362204523cbe675cc93afb8d1c60fa61852be317fde27c16ba21fddf3720fb0
SHA512589d93197b987cc2dd391d355b9667df92b4150053342052e3a9de8465c118642512c3a0687c8a17d3dc3ed36f5386bc4925091070443f3f1f63538af6cc6b3c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD5339515c8bfba9052a9ab6fb482f70748
SHA150669cbdd61eb287039d5fd73e39d9762f1a39df
SHA2562af1c76c380768c47845f34d19ebc22bb1258356bfaebd92bd20943dd724ccf0
SHA512377be95c98e7b62ec8e8ea3c0c093d6963beec2584c9f133b1f5dc675088d25684610cdaf27b0346368e32dcad888193629c3179cb9519098c7713c92d8da046
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e655aefc-0df9-460a-918d-396e9333b36f.tmp
Filesize7KB
MD5ae7c48edab0252a55e2424acfbfc1ea5
SHA1c04a569e869af6e84559ead07da12ce9c0f5442d
SHA256a7eb18b63983640ec26ad216f801edd3c83bf98a1b0eaa2792a50d212d12aaf5
SHA512435d75f64290a33078962a59d2d9fdcd18ca5d92221999c83f79093668668535a391d21e0a46a31cce162d9f5db1a0c868b32eb81a7381172caeb8509ae245f6
-
Filesize
275KB
MD5a152cb03e4d98afa3bc75b1b1a45d073
SHA19489c2d8cf809d7ccf14b62237754b0ace64e830
SHA256c3e35cea8091025b90491d7e3d579edc88a1178a40f33a447982a64f486f969e
SHA51216335a957c2aa7e7d9080f442b578d6a7c8c2936c5a304c9060f41f6f4dc5799e6434d38d0142165e50775fddf0343dee15b41f5d1ff14c4aab8e49571d0d209
-
Filesize
257KB
MD581ce3209cfabe2c4a33580c9dafa521f
SHA1536216f024f42ca76118f5e6ea564064d16f4273
SHA256b9f0f87729594bd8b96052281e1385878ea0882958eda1c31bbe3aa1984f4160
SHA512fab576ae8585e7c8cf65723ad2235092a05b41903b3e7c2173f7e307d9d621ade8e1ef8c301540a460efb99b923b84baa37ac88bfe03a7a2d5e5228ea9dbb403
-
Filesize
257KB
MD5a462a478abb693f994fb98d21317af8a
SHA11cf9c766a9b6a262818bc0aac67c75246de75c05
SHA25647f15e33b2a3b4342811172fc332b096158e16e432ab8a31751656e92bc15e1e
SHA512dad3da2f10d638a579e706cb0b6c19760424960388fda5b644022644037f973475ee21ca930d6a34e81e806345300a9fe32361465f31ff59930d9a702f0d8d6a
-
Filesize
91KB
MD561127f13a15ed3f27f15869bba8d0e1a
SHA18593369ed5e3d5fb590f3ae168978bfc29c071e1
SHA256715d360f055151a6f185565e1a0eda4b481133d478c26651bebcc368a4a27ee6
SHA5121dcaa40b4ea60f68047875710f7f57d05dc19082c1d692e17022c9051726a3d26f36a15f178735ee578e71e2630d5f46e6a88d6d258fcafe13998913719b6e67
-
Filesize
88KB
MD53167db31458d30e96712b05ec11770ae
SHA1b675b45f331bba2952a90305c2c6c0ba0c0db1c5
SHA2560414958246fee4d4626615f286e29ff1f243b10398e0746ded698ca8249f1425
SHA5123e613de6226f26b4ac67b573da415c89446e2af841882e725e3808ac2c54ee2a501ea2a8d9367b8c0b4c7f9d48ca136debb1bdea2d05f5312078c789f5e4085b