Analysis
-
max time kernel
99s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 09:27
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://chef.net/
Resource
win10v2004-20240802-en
General
-
Target
http://chef.net/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133706068818940712" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe Token: SeShutdownPrivilege 1752 chrome.exe Token: SeCreatePagefilePrivilege 1752 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe 1752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4700 1752 chrome.exe 83 PID 1752 wrote to memory of 4700 1752 chrome.exe 83 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 3940 1752 chrome.exe 85 PID 1752 wrote to memory of 1088 1752 chrome.exe 86 PID 1752 wrote to memory of 1088 1752 chrome.exe 86 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87 PID 1752 wrote to memory of 4044 1752 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://chef.net/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe7fdbcc40,0x7ffe7fdbcc4c,0x7ffe7fdbcc582⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1988 /prefetch:22⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2140,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3052,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3868,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3308,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3364 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4784,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4416,i,6082488728793748047,2924531085694788499,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5165a66147b8387811033f44e6faa4d33
SHA1c48e95a8b17185c32d30b32f16a94d3a2f37c11f
SHA25600d57662fbb8e7923ba5ea66aafdc38db7a07e55356eec74f5463ef20f983857
SHA512a974226dbba0a2422db8bb8df3c2c37c2c962abe3c9af7d77774b96e187fb7e17af836489ffddc6c04007ec4ed61b94a162ac107d3c4fbbe810fcd648c8116b0
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
336B
MD56b2134f022363f63d2aa14bfa43714b5
SHA1d2098174794798782d95d4a223e15df0dc3de869
SHA256ae0e6a858dce6dd74752b7201920c2f1a2adb520428195fcf59c914f9862285d
SHA51251e2b2340e446cf5087099907155c5ee2f0a6e100c3578b29058d69eda420ef6c7adb83c1a5abf6f38cfb38eff282f7f1d5893011189233f001427f89902ee1a
-
Filesize
240B
MD5748e57f8f564bd513fdd64fc2ec958da
SHA10bf1ea0dc589436eeda12cf174c1137aaa9bec9b
SHA2568dae0928e23577ad7f1c8b653777b7848d1ff14bfd07f6001587129e08f0fac4
SHA5127bfc3dd9428dec00fa63c0d524814b4e50b0210bb1b4378221bbfa842ce5aeeac4a3f34226a9a4a4f9b5d86b5dc4c151cbc6cbeadfd219991e934f584fc3663b
-
Filesize
3KB
MD55182132f1e3a9d6eba49f4aca52e79f7
SHA118cfc098509ac32176c751de0204e386a8c7ec23
SHA25616d018656726f4d691a6d7252d1afd51374d11480a420bba82259a07d9770e45
SHA51273b7e91c3b748adf97053da749d3be83694ef242ae87d1cb73b445c2e041f3885c0fec3ea58931abe3aa219ab871c8b167449c64d5a540a823baebea85148da4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD56858c0b2d244cc41fecfb77bccaadc3b
SHA1b3c039ec8d8bbb9fda66a1f7ebe3d4ceebc1ac94
SHA2562a11b255aedd11ab9503fe2abe2243674eebbcb5160c3267392fa3bb21fcdded
SHA51269abe6e301edc1e044c834e81e4c199d28691dfb91995f30a4bc44ddace9dc8711684879cb4f0903a957566bd964841465cbad82d2b76076fb0c20237b36b701
-
Filesize
857B
MD5c1718014dd1c2505bc6e09e24c11b5cb
SHA19b42333a05598dcfbd9d8b3a4e3482a2cf7f3812
SHA256a5e470bcbfd2312c31114e14c330a1c7a9382b66ccfb068156083982b96d424b
SHA5121077874df6abd1f235c621aa5e1b4584c9afaf793346b6ba28533a8ec03422a2d09f87550f6f5e6906b53a330dd81ac5441e534d2b7dc94ee76795afc94830ce
-
Filesize
9KB
MD52fa915aa552d03c38f2108c875f31ac1
SHA1f42d8c507b9cf636460cdc392fab15b817e000f2
SHA2562baafe068c154bfa437de31e2c69afb458a4abc3965a2170f10a7e35cd11f2b3
SHA51269de91d911dd7fbc3b8da709add6d0aaf5dfac3795cfacd83e9686dd04df5c31c330c47bc6b66f42a70c30c2f5c1b1b26c6cde4bf23bb600c7de4185b12f3bba
-
Filesize
9KB
MD5209cac8ccf57ebcaa8981619691252fe
SHA14ae8d2fe530afc5bc72a721b3fb21e99944c677b
SHA2560604f9cdc39d7dd259e0024c5185366110862c6d642b61ea7abbe1f2200d2d60
SHA512f4c058ab913d34a715fbd7846327756da49567527f12cd87eaf9abf04ffb99ea49c84cb99da082b735e149a7a22f20d758b75f5195764ef9498d7b186cc2343d
-
Filesize
9KB
MD5db21293984e66f613598099377fbfa46
SHA100b3f5e1d0fd46965bbf4a6d004e9325eb9a03bf
SHA256a28b650f47490ce6097913ee7a9f694cfc247accab7210d18bebe6c7bcd72eec
SHA51273b9304a69c6bb63250d9ce66ffdbb18a0a639b37e8000881f62366a5009f503c1e698916324e301e52a7d00fda9faa6cd666598669a7e249e4fdca53e209dc4
-
Filesize
9KB
MD5b7fd4f9711c50c07255042a1767230b3
SHA1f18377b9499dadfcec1944690a371e1b3f823b5e
SHA25685304f6fc94c4236157c103385e481e9cd83c0a09c0a076c3e36e982c574be1e
SHA5127dd9e6ff17a7cf6b25e0041561859ba58105e0487892a63a41c965f15479086b5cfca188e195daec0e766f5691f00e94c686f3f6115976a7d5d010b65a3348d0
-
Filesize
9KB
MD54beb3282d1e40d1805e46f099e68d3b5
SHA1f9842ea6dd6415ffb1d3291d6f47608f43146d1a
SHA256549b0b652e7379c72423a7ef0bf939dea0ee0a63cb8fadbb18f4d79b4d710669
SHA512c974fcf7e848ab60092920ee97c3a8b1007e33e4748429b75a4ef4f3052464c8a8f24f8735e7afb2133124295a87f0a185c4a7eb86c902a4d5190d0d1fc9f716
-
Filesize
99KB
MD5a2e51bae718f559936454e9e4bac8338
SHA1667822ed860a2c489a3be5cae7345d3994641d93
SHA256c026b28246f395e2df15111002b2d7017593fdbfc3c90422006131357a3fc17f
SHA512533301cebb8498b8b77f27d9545e724395960025d85f8690145f33633aea0b102d7c5643cd8f8119cb6b430f94e56b6b45b9265fd4e322c2b79432eab3286d0f
-
Filesize
99KB
MD509e8b4187ba4cf58d8f335fc56517bc4
SHA18bf41582edabe1cfb7f388317d1978c11722d045
SHA25639ef5ed2e486b59320dd43a43795f7c45e33bd3973b95c6603656add842e0af5
SHA512091d4406282a20a68edfd00081bb1b45133a18120e1e419eb8005a355380fc73d211fad25895e92371f27f9048ee6b3fdaa8d52d7f54f5aaa70f28d562899b5e