Analysis
-
max time kernel
83s -
max time network
83s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 18:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://199.232.214.172/d/msdownload/update/software/defu/2024/07/am_delta_patch_1.413.606.0_e71de4793e3fc5b18dcd2ea10d41275c7f86482d.exe
Resource
win10v2004-20240508-en
General
-
Target
http://199.232.214.172/d/msdownload/update/software/defu/2024/07/am_delta_patch_1.413.606.0_e71de4793e3fc5b18dcd2ea10d41275c7f86482d.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643339749106241" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe Token: SeShutdownPrivilege 1352 chrome.exe Token: SeCreatePagefilePrivilege 1352 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 392 1352 chrome.exe 81 PID 1352 wrote to memory of 392 1352 chrome.exe 81 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 1756 1352 chrome.exe 82 PID 1352 wrote to memory of 4952 1352 chrome.exe 83 PID 1352 wrote to memory of 4952 1352 chrome.exe 83 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84 PID 1352 wrote to memory of 1968 1352 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://199.232.214.172/d/msdownload/update/software/defu/2024/07/am_delta_patch_1.413.606.0_e71de4793e3fc5b18dcd2ea10d41275c7f86482d.exe1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6493ab58,0x7ffb6493ab68,0x7ffb6493ab782⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:22⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2748 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2756 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4396 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4352 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4140 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:3096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4732 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:82⤵PID:1316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4824 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4584 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4152 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2428 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4136 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4664 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4580 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3244 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4032 --field-trial-handle=1904,i,8672925806981979,18063116570623608140,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5d7b5ea0ce80cb9d289c3e431b4901d58
SHA1b2c07267ed270683066dfc4d37bf3e41ad5fe409
SHA2569b7b66445d33a862a9d1530c6d217fb9d51117e802e87ee23ddb9cd6d622bf56
SHA5125bce5afd826f8f8cc98d1c4b66dc8cbe8acae24ffdf9135c5071a2c594cb7be8d428b70aa9289efa57ede30c2009cf79e853dcd692712c2f82c43f9a8543d666
-
Filesize
7KB
MD5ac44bee67700001aff01104e2d46c849
SHA1268f3f7224316b01a5f4dceec62be9a18c08d205
SHA256e2576cc69b523d70a22e10d1ba2cbfb7a49f6b22c58fe5a876071f2aa356ace0
SHA5122d8ec8840ff05104321a45ab892bed989c82286ff8f415d5ce704378f6ed3f0501729ab2c895dbfe5fab778171e602e226ce69a885ed7ae15015e671528150a0
-
Filesize
257KB
MD5e0c93aa9ff6b9e2050658024ac71c0ed
SHA1da22787e59c8644dd0c4220f6fc54f5b6def8d6a
SHA25626c71cc68de993e1f7a55beef0c709f7f87b94f5460b95e5ddf17c20b641b253
SHA512a79a76d22de916fb16ff89e93591a34b6e41a431ab3a8f2820b0cbb40080d13c8cd1278b907db79518e24fba5eb977f096c134cadeb456361262812c6da1465c
-
Filesize
257KB
MD5dc5fdeaae3124cfeedbc6cb2bb1bf664
SHA19f23ca1bb4c64b7a4dc2dde04abf17b3c42939b5
SHA2565c5b89bf874c28978f6f5d369a3a23b3de2cb4845345037e0b7fd825ed9f7fae
SHA5124f4dbe9817352ef72d7ded980ec9a274201ca393c20cbdf14e11334655491062a2be65d457a351d56e5cd6dc2d85221d6c3b753ce710d1a6607e0aedc55e77d4
-
Filesize
281KB
MD5a28e95300e1aed4aefd491319c2319c2
SHA11bc11165f45c676cf81ba13669e392bb153d567c
SHA25688634a4f3a516f0f2ccdd101a8e981d4de8d5b641464bed41a7a08faec945a55
SHA51224f03c85a8c2a13a48df974e57882ea0445588b1810782e3f0ed9c8a240a888e76e5c57f5dca1554aed3e6a78875ee2327547616467fc5c64a13785c0cb9a134
-
Filesize
91KB
MD5ae881c86780877ddb7f825ada75b054f
SHA143aeac05fb9cf962eb9a15f754afe91591ef8c0c
SHA256d0f5f5ebbffc86cb580d0d08743f10bd30391b43567df9ff5c4d565c7a3e44dc
SHA512c7bed2554b3d7dfa49b26bf190d1b6e9e5ce5a68e588b6e5ee047bcd1f43f9c0fe60144eec3c69877469c88bfef53da04980c990ebd1e655f876688b32cf1f06
-
Filesize
88KB
MD5b000d4774df7583f887ec26a055445d3
SHA1c2f9091a2e3014608916330c2f6829f5fe215a54
SHA256f356dfbac77d6c1adec2d79ffb51a5afc47b8a7dc8545ecab0f5f911176f3d78
SHA5128bc47dac74886fc8a53039f3f0a3ce8661c787decd150ba8e93abc6ee69b0c58b636d5cc39a20f3a3319fdd6bf5b2dce3bbcaccae54c53f950d4a86a9c6931bf