Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-07-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
Install.zip
Resource
win11-20240508-en
General
-
Target
Install.zip
-
Size
36B
-
MD5
a1ca4bebcd03fafbe2b06a46a694e29a
-
SHA1
ffc88125007c23ff6711147a12f9bba9c3d197ed
-
SHA256
c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
-
SHA512
6fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643232244222887" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe Token: SeShutdownPrivilege 4692 chrome.exe Token: SeCreatePagefilePrivilege 4692 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe 4692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1344 4692 chrome.exe 81 PID 4692 wrote to memory of 1344 4692 chrome.exe 81 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 4528 4692 chrome.exe 82 PID 4692 wrote to memory of 3584 4692 chrome.exe 83 PID 4692 wrote to memory of 3584 4692 chrome.exe 83 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84 PID 4692 wrote to memory of 3784 4692 chrome.exe 84
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Install.zip1⤵PID:1480
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa326aab58,0x7ffa326aab68,0x7ffa326aab782⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1552 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:22⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:12⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4264 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:12⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4584 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3936 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:82⤵PID:1032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1476 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:12⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4768 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3380 --field-trial-handle=1880,i,10719610586434002854,1560844923171924878,131072 /prefetch:12⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810B
MD5f3dfeb0f13798500b1669e14c2c5c2af
SHA10701f6960ed8bcf3686df249943c2d865d6dd2b1
SHA2564fe86ac7ad9a5316c2bd1696a7431e7de22e9125e587ae9f979d4a287a630804
SHA512b6c6f07c99402e95034611601ae348e0a74f60a96557fd45dc1b1abb14ea304b5b9e8f36a220198a1effefc2bd51215740e5b2fa9dbf908243d939341930c56b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD550fb60c907a056e9efdfb74ecc04e881
SHA156db4e190d720a3fdd5e965d9007262aa2150522
SHA2560861f9397eb950b2a10c3057dc1732a5ba3739264c204737789ff9da61fe9327
SHA512f5b056681fa80c2e9d0491f615f2b8c3d2f65551301ba7220621ccd80e2021d30b653642d27fdf954a495d9f9cdbe8ec1703e21d0dcfe258ff7e4d4a09818641
-
Filesize
7KB
MD5f941af4288d616ae4fbfd359aab5e1cb
SHA104e75d890e31d4173bd7c250b032355a9feda359
SHA256a8497dc8a8dddc10add6ff5b4b089780c74fd0269d0d27c1969b1d2ded2e0013
SHA5122a354aedc3888f05764772a84f94fe7d2e0c29ef3a6cc02109ee942bc9ccfacd9d087f5102557f4ae779a8e9671f5713a1ea9d44f0fbc8c8a9256f3a47bf7db4
-
Filesize
7KB
MD54315a4e9e542114469612fb2dc2e5744
SHA1c346717ab7f1290299662b719fdcde9063c3a6d9
SHA25697dda44a7f125973e73288b432b5d1b21022ba1d6b2e7f1bd1e1ad4501076a20
SHA5122bdc1642ae9b8420b357683ce6c8cd60e9dcc04f4fe8fc8553c12e21d578a5318d567cb70b8682017d05ca436f985e27b0c5afc364d3de18d439f2d3fc103246
-
Filesize
131KB
MD549b9b707cda0b9ab1d0f2c19b4d9d70c
SHA18eeb92284efa94f740889e15139affb6caa4e123
SHA2563c60074ae4567c653e6b87fede242279f243f566dd2b0442458832eb6a409dea
SHA512e729529a3e43ef89d057ee3997f72244924bde4a6985be9b216dea06096cc7b6dc9d8ea53ac21610c540663f930586b63a856da2c9c6c755d6a026c52b6a48f3
-
Filesize
131KB
MD55d23f8b5e43e96eb0d4dd12e3e655f51
SHA116f10b974faf9ae95f20f538270f5626f9a05aba
SHA256a68c88f98884c44bd464241624110efdf0df5e93e88c3da3348eb2998d447f46
SHA512421794d6de821fa77dadc544da076f77004820da2a026d941383585d3d9192c975de247bd71fd91b48d3be63fb71057eefa2c00bc778b53f3031da6f243ece12
-
Filesize
131KB
MD5fa34e9c5c24d43189beb6ea1bb2ca6ef
SHA1e13a84da1ec78d58a7c7b37ef4a5185549f3fc9a
SHA256464b4e516e273c49f0da28460028f7e76cc4349e089f0fde8e77c29926673a24
SHA5121684ef137fad35bc040430bc12fdc2b9065108d0bae71535aef9cae142f3ddaab56fbcaf6df1036d77fa097439717cc8369cdea1c08cb60a7447e885f6087846
-
Filesize
86KB
MD5fe5fcd5092203e46d571a0ad5c8076fe
SHA1d943b91f478440788b3d576e14dccda169d8becc
SHA256ea77ebe0f10969013e5970ac52a8ae85b2c30f4a9a61c53eabcd605ed6d9ad18
SHA512d707bcb26755af837592b048da60bc95c2e37fcd067ea2b8b14386d22cd3fd69581923b58a56b9eedfd4faf588f6594f37f98e5b9f4689983e833d5651700f5f
-
Filesize
83KB
MD52869cdf797f93b10eba8441540212c4b
SHA112f77744ef5dcceb7a7812fce41f044110c698ad
SHA256c92ff5358dea2dc7c6424ce8b9114af568b7c379bfdcd5dd6619365dd2875bcc
SHA51268f1f8742195bd177c709ffa1ed8618f1d7fd18aec410d637bc0d595d0d44c5678982073027fd727e9d95e7f088cf6d288b329caecf546dcafb0005d96f152ec
-
Filesize
264KB
MD5bcbcffec408da0709a74882a760f7d98
SHA1b67c43aa348fa3b2d14b554d2cd0356d5f64f8cf
SHA256df4045e1b681d7da3f4f1a19592480fa0e204a5e26b3580a0d28443890b0086b
SHA512fdbc6e95a4cb06b98b519e28872a11cb39b0b988a488b03edf572aa9d86eeb5c2b924a70424523985d61a82cf9a09a72bdb1cc20ec13f3309b47a9e99cd1b4c8