Analysis
-
max time kernel
109s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 05:56
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://files-ld.s3.us-east-2.amazonaws.com/59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee.zip
Resource
win10v2004-20240802-en
General
-
Target
https://files-ld.s3.us-east-2.amazonaws.com/59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee.zip
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:3451
37.120.233.226:3451
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133684342027589277" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe 2244 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4880 4052 chrome.exe 84 PID 4052 wrote to memory of 4880 4052 chrome.exe 84 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 4512 4052 chrome.exe 87 PID 4052 wrote to memory of 1664 4052 chrome.exe 88 PID 4052 wrote to memory of 1664 4052 chrome.exe 88 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89 PID 4052 wrote to memory of 60 4052 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://files-ld.s3.us-east-2.amazonaws.com/59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee.zip1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdf8bdcc40,0x7ffdf8bdcc4c,0x7ffdf8bdcc582⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:1664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2520 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4964,i,16557943125718023324,10084120027891155240,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:716
-
C:\Users\Admin\Downloads\59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee\Coffee.exe"C:\Users\Admin\Downloads\59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee\Coffee.exe"1⤵PID:3200
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244
-
C:\Users\Admin\Downloads\59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee\Coffee.exe"C:\Users\Admin\Downloads\59cbd215-76ea-434d-93ca-4d6aec3bac98-free-coffee\Coffee.exe"1⤵PID:2800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5b2a964fe439c9578239e1ff52de6a0e3
SHA15e8cab7528a42b6f13ed8b4e46922b9ed36a4256
SHA256e42ede1a3d4b14b90736e0508b0e1b8db2ff131684ad0eea0010af4dc8ab994d
SHA5128b9c9e4a297765eca960f76e88ff375683d4de1e4a276de4fa657aacd649df5bc9d329dd3d93e3a655a1aed6e3bc4e7390431e87cb27eedf17a6679de4a4107b
-
Filesize
649B
MD50dc881de644c95dcb401e94a1f847671
SHA16c002b247a29b781cfd229cdb544d7a56ca62340
SHA256bf395bd256c87f706c9d39d50320882e135e0e4dc7c2213aac59967ae3865f3c
SHA5128016d6a158ce42234b7e9936eb836f2aecfda05bf1048bb2b06edd1410e7e3065e54e98a3102994bc79a472246ca04f0e6751c42a4db30d828cfaf4335358949
-
Filesize
1KB
MD5f54faf925ff6a041845ebb05f96e83d6
SHA145cfbcdb3c743c526cfd7a0689fe32d1bc45eec3
SHA25625869fa9d8d2e1961de82fdb1ee33f4401866101438d47eed92d95f9fb7f96e5
SHA51223a54cd8fd099625c80ea74570b5a4e25dbdca7130c48d850124d61e722201c46d48517ab360069c8fb2e2c45e509f17530de6fd378ddae926d3efbaec2f05dd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5db199d13b6296ee02a86ae734c0dfba0
SHA1e911b7c029881e8503a453a686afb4d6be7513a7
SHA256f755dc3692979bbfb52a7e7aa5fbd34458ff82a3a5624670d59f924b6831dd74
SHA512105142015a0bd57654d16f7f3bc4a23ebb60a0f7ea5123ebb2edd11b5a329b0588e7083b9cace82c14a24b35736a2c2266936733379c789d6841c24163224664
-
Filesize
8KB
MD5524d08ce697af9a13d5f9fc529bbb7c3
SHA11e0da500959dfb4666555d73ccc746fa4edef9c0
SHA25682dd531b87f013926f30e3a25cdef8fbd0b691797580bb61b847fbd9005ef41c
SHA5121bd72a33d60acc4338cad69a8f61163192c60aa377e117e304ccd8f3061e5ccdda5f1ec462159e1d3ff20db97204bd4489a07b5d3b5d27dba573d12022d3eed8
-
Filesize
9KB
MD5fda56dc13e48824058800bee74a84697
SHA1ef84e2c4c8a1dc62dec6eaa48b87e081c83e25de
SHA256d00fcf07d30ec3e9d61d21049e843c70e25eadfd0c7ca2bed5bf29cd9b3bc40f
SHA512f54739eeb8079f81edc9a6c3c9969dccce29ab87635c21f307e60e6a09d642e8b3761b749a652d6b468322e04d533fbcacffed706a4c011cc30c20edaad7dd2a
-
Filesize
9KB
MD5450b5f034002c00928d524bce5518174
SHA139e4806a007678c02e95589b3072278dc060f57f
SHA256a5defcfb1f044813655d31aba8da524d230aea993e8245dde71fdc09ce888280
SHA5127737694fa047d54812a58ebe1def0c28d3120b5eff5723e2102740e76eb61aeac55f79ad3e2bf0e384dfee83d858fb427f82e70a369c9ca392b76198301b52d7
-
Filesize
9KB
MD5b9371e5fb1f14487187f3cc1b78b71ed
SHA193d1c4dd59401f7cbeac1e6fbd82ed6332e1add9
SHA256b69653dace90108a5cbfcdc26cb057edf9cd99351ca07c9ca554b59738ac2592
SHA51212256fa097f991881e2fdf8e5373ce03b75a8abd6ef9f392bfa7df369da79ec253cf9d50418431144737b25889be54424cecb821cb74c6e9ae0bd9c8641d20ba
-
Filesize
9KB
MD5478b9456963626d2cfca3a49ba0672b0
SHA1fdf10e2779d8f6af7f01f6822b737a1f36154eb6
SHA256e29d546370611db7b76f9a8994864c87667ce4f4d0aac4ad5fd67c0679ad1d04
SHA512fb425180b6b5d6993a996d3e7aaf1cbaffc6af8ec8fe7a7f42295f16b0d87db00d642078744f0fb8fda586644bb0d15d3200c52ed0f3e6b4e1cc17da0264fda7
-
Filesize
8KB
MD56db6b05516415b8ef051251766730ace
SHA1ba8cd6c75cc385353828d08413db5181965f2190
SHA256192b79ecf94460d066dce0e6e94b157ad83b253ccb047cdafe3e267151dc8999
SHA512f5ae2a6f95c5abcd0483a942cfaeeabeffb58026533986304d8aaa8a385805ef8f1cd923a59f454d017c166144dbd473e06e1fd058f256c980076e2fbc6eea0d
-
Filesize
99KB
MD59a8a31a1b1fb65bd20175380c6962558
SHA1a13f0a0dcb1c83a597947238359c956a82e21d1b
SHA256f32b4ca7bcd998afb1abfaf0d8cbc5354a297a42b4a465dea12cac0b2aa26170
SHA51289830910a1f76dd28e7cc21ee14165fa1212b892f4cfc2c0b5ac91e3af3806710321b8d5835a342175dc65722339fddca3cf2673d00e531c81af582121ce34cb
-
Filesize
29KB
MD573f0f77181e1f06a9dbc41ea9e7a03fe
SHA1c895f4a970c612bc51e0fc272c3f08283a13d34f
SHA2566f33ae4bf134c49faa14517a275c039ca1818b24fc2304649869e399ab2fb389
SHA512160eb2d80abc6911f435df2a69a1aa8914f3fdd56ea6399e31a5fd382a676bb734fbfb93cd0abb0f3b85e9af1847b13a440430b054a3465c349d7423da6ce4e3