Analysis
-
max time kernel
1199s -
max time network
1170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 08:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tr.news.manufacturing.fr/hit/ZSDC/028/gz/yKQfFeays_hwH1bQQGlt_g8yfkXKVf2cV2RoHxPNtcf_epZ4qLRv6hqH2JyQoUASj9wggq2Wk2q0r7rqCA45TmVne4BHGgBIDsndw5qIdsvFR1DkSj4s_8icVOY6KOX_A_-UCjfKrB4cwFaeTPDBFj21BCEey8zVqV7aH4jvpnICGRBo3MVqzNtSNSdGwiWPuK7AoJoUS-jrfWF9KwzIUNqP4nLtAoA5U-cZRo4KQrk9teNMkZfMPUWCKgod9-PFM1lz7KPnEVMoQS1FOENJG1WRWreaYolmrPlZbvlNA7ftCKDLe_roVyGdKDk1pZ-mypaL9DjD5NTwLTHu0vgsfo6JfF8hWlywTDhtQr90AyaRHT1DM5FpxNj4K-IMJLWKQt0XfY3F3UdV
Resource
win10v2004-20240611-en
General
-
Target
https://tr.news.manufacturing.fr/hit/ZSDC/028/gz/yKQfFeays_hwH1bQQGlt_g8yfkXKVf2cV2RoHxPNtcf_epZ4qLRv6hqH2JyQoUASj9wggq2Wk2q0r7rqCA45TmVne4BHGgBIDsndw5qIdsvFR1DkSj4s_8icVOY6KOX_A_-UCjfKrB4cwFaeTPDBFj21BCEey8zVqV7aH4jvpnICGRBo3MVqzNtSNSdGwiWPuK7AoJoUS-jrfWF9KwzIUNqP4nLtAoA5U-cZRo4KQrk9teNMkZfMPUWCKgod9-PFM1lz7KPnEVMoQS1FOENJG1WRWreaYolmrPlZbvlNA7ftCKDLe_roVyGdKDk1pZ-mypaL9DjD5NTwLTHu0vgsfo6JfF8hWlywTDhtQr90AyaRHT1DM5FpxNj4K-IMJLWKQt0XfY3F3UdV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133640362860596975" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 320 chrome.exe 320 chrome.exe 1980 chrome.exe 1980 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 4536 320 chrome.exe 83 PID 320 wrote to memory of 4536 320 chrome.exe 83 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4112 320 chrome.exe 84 PID 320 wrote to memory of 4424 320 chrome.exe 85 PID 320 wrote to memory of 4424 320 chrome.exe 85 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86 PID 320 wrote to memory of 3460 320 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tr.news.manufacturing.fr/hit/ZSDC/028/gz/yKQfFeays_hwH1bQQGlt_g8yfkXKVf2cV2RoHxPNtcf_epZ4qLRv6hqH2JyQoUASj9wggq2Wk2q0r7rqCA45TmVne4BHGgBIDsndw5qIdsvFR1DkSj4s_8icVOY6KOX_A_-UCjfKrB4cwFaeTPDBFj21BCEey8zVqV7aH4jvpnICGRBo3MVqzNtSNSdGwiWPuK7AoJoUS-jrfWF9KwzIUNqP4nLtAoA5U-cZRo4KQrk9teNMkZfMPUWCKgod9-PFM1lz7KPnEVMoQS1FOENJG1WRWreaYolmrPlZbvlNA7ftCKDLe_roVyGdKDk1pZ-mypaL9DjD5NTwLTHu0vgsfo6JfF8hWlywTDhtQr90AyaRHT1DM5FpxNj4K-IMJLWKQt0XfY3F3UdV1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb32abab58,0x7ffb32abab68,0x7ffb32abab782⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:22⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2192 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4592 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3224 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1668 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4440 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3952 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:1156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4356 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2948 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3092 --field-trial-handle=1856,i,9120457680613574261,9006935530770799951,131072 /prefetch:12⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59693ece65cd89f77f127f0ab5a1a3028
SHA13081328b1c18174d2692a65b4d82d18d72fb70d4
SHA2560da48cba288942329b8e1c02e4b98d2ea5e5a91641c8fa0f3d3178643c281e27
SHA51217361a7f79c61432e23e9646968df057e4ad3c76feb5d9797fdd65cf23ca5a08271bf82e5e1fc604bca96e91993f45fcf45b34cff2777a359abd0f9473ae3474
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD50680363ed1341b9f17118509b26246f3
SHA1cfb532b2bb986ecbe48ba5cfa439f3b7c1e10531
SHA256e28cb14c727a56af95184a27c17fa72e36ffe3eab88d6b531264b1ecc777beb4
SHA51227e8a7ab194f5571279ab4d81c918f53344a8814e5d715ad57229ded9eea45bf47bda0c400cb49cc328ad6a16931d00af2af5cc019a73d17aa5774d27c7fde3d
-
Filesize
138KB
MD5d51c78cd5de71125633eade4ff0c7cfa
SHA19c88b0c2cbdbf40d782ab1f0199ba71d6cdcfb2f
SHA256a91d5bd122713a1d5d39c9016e7aad715b335e378c110389420ef63ea3da4bec
SHA512adfa23ec87fd7565f599c7ed74387536634b8924bd16d7b36b49f7a255e30da82d3895d9bcd5a3d9f167574f56151f4b768c3ce7b804f5f05dde7202d6dfbb32