Analysis
-
max time kernel
154s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 07:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kun-6.nww.kr/common/security/KOSInstaller/DAmoWebCrypto/DAmoWebCryptoSetup.exe
Resource
win10v2004-20240226-en
General
-
Target
http://kun-6.nww.kr/common/security/KOSInstaller/DAmoWebCrypto/DAmoWebCryptoSetup.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642934922693477" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 3832 chrome.exe 3832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1260 5064 chrome.exe 91 PID 5064 wrote to memory of 1260 5064 chrome.exe 91 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 1108 5064 chrome.exe 93 PID 5064 wrote to memory of 2540 5064 chrome.exe 94 PID 5064 wrote to memory of 2540 5064 chrome.exe 94 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95 PID 5064 wrote to memory of 4048 5064 chrome.exe 95
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://kun-6.nww.kr/common/security/KOSInstaller/DAmoWebCrypto/DAmoWebCryptoSetup.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb2a39758,0x7ffcb2a39768,0x7ffcb2a397782⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:22⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2964 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:12⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:12⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4252 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4716 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4756 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1152 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1716 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2572 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3796 --field-trial-handle=1904,i,10915178173407585948,8752703815601249154,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:1128
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
986B
MD5b162dd77c5f4409f06aec41f326a34fd
SHA1eda04d8834afa684bc3a14839fcea40444bd5407
SHA256a2124e1807207c884522f52b8e7fec6dcb6e431c4136bfde9a386d9cb2d8fa1a
SHA512503de9be06f0d01698e0acc428af0b6266680ecd4df9be8a21fc81f730ef8ab3384860d936b90f75ac6f67cb556dc723d990978cb12d35db40d43ca3f3e271e7
-
Filesize
5KB
MD5993f7a18f0bf604588f6e84e8f528333
SHA18b706f6e78638df0e291193adeb35e7e8ed29504
SHA256ad0d30e3ffed8f1dc209023385e8b1b4acfcd55254b6f9f23118544f6d648edd
SHA512de7ef18c6b0fd4f3a1dcd748c193647bf324238c2e7f05a360ca075edd55a932cd0f7c468ccfeb7040fb1177141cb7fee8e14a77c3d94c31d82e722f9dd0db56
-
Filesize
5KB
MD56051b3ffc18ad38c88bee9313d2b500f
SHA18f4103afcb3aa9fbd242056a764d0e7b0105ad52
SHA2560d230d1a40c443d1604b2262bb6aa9f0b5a2c1e2ef69e88db905c8d740338ece
SHA5121d57747c8959a3d4e410aa710de8129d3a9c21048c63e4e2c7cc5635d7539b69b673f275ac955e3da723b37ab7b5c983c290aeb5d31633feee1d117839ffe344
-
Filesize
5KB
MD50f0927be108d0dbd6bf7b978d7bdd29a
SHA154bc635e7f4d0301739d714fe2e32001aa71795d
SHA2564dbe4da805f255012fe36add0184aae5dc17d1086e8808b19c84b02f382873f9
SHA512b3f6d8e420a986bce1b9f44b3dbc90bf2c764f0b927a3824ee84dcfb12337612cc27490813de698360480961ceed327c70ab0ad99e6d41a59a6b5e0319b45ba7
-
Filesize
128KB
MD52f8bbd66858fd48b402ce30c32d4e58d
SHA192eb78333b840c6a3a1ab4416d1d833a3024ba11
SHA25613971176f1fd7e4b034a2b53ed99c5705bca8b3c3b79a3a45846a4b8493ac5ad
SHA5126835687d012da28bf78090292573f578127ccc3cc040c7e7ddc798b846cd01a94121439f1d15aab5e12c2ea8f8c1ed885a7868116db3910752736ec90e88a615
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
19.2MB
MD576671ff640a4f29fc9b52f2e8313a3eb
SHA1a85d07ead6bb0efef4f20e5f3018ec28908deb74
SHA25638afda47dd5b55c4740f76b18a1877351946f17ed25f35fd0a2bd98e1a721270
SHA5127e613081b61dd09ee144566b58b2d91955465b509da05779e0c43ec6c86d169676612826fd73715cc1d7e7352634031a0d03ac230cc36a2f027a748462d38383