Analysis
-
max time kernel
75s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
v3.0
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
v3.0
Resource
win10v2004-20240709-en
General
-
Target
v3.0
-
Size
171KB
-
MD5
7f5f9e4fb52a48fec61aa1395da229e5
-
SHA1
37448d6369e4b63c8682e9d96b1747d5f35dfde6
-
SHA256
922761f877f00298bb78d905c172580670fa399156f7ed9a945377d6977ec848
-
SHA512
72865f1b18f80fc5325ecd0b13e4a29efa27d5a40ba92be902f8bb1db3a58543ca1d87ab684ec0822c35e334609a6975aff7b1333e93e920c20e2089b07c2cf7
-
SSDEEP
3072:tbIxwVwhS1lhL26yOPP/X6OOKeR7+Cms1YElWGaFh2OF91P6eY1ytHhAI4oZ91Pf:aFnoodvSOKMQpf8j7Ley1682rmY4z9fq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133665889897471767" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 672 chrome.exe 672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe Token: SeShutdownPrivilege 672 chrome.exe Token: SeCreatePagefilePrivilege 672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4432 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 672 wrote to memory of 2364 672 chrome.exe 100 PID 672 wrote to memory of 2364 672 chrome.exe 100 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 3956 672 chrome.exe 101 PID 672 wrote to memory of 2712 672 chrome.exe 102 PID 672 wrote to memory of 2712 672 chrome.exe 102 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103 PID 672 wrote to memory of 1440 672 chrome.exe 103
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\v3.01⤵
- Modifies registry class
PID:3604
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff91598cc40,0x7ff91598cc4c,0x7ff91598cc582⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1788,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1776 /prefetch:22⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1812,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2140,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3400,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4584,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4788,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4944,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5000 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5028,i,17705094565170276937,2291054196953487262,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3028
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54226704a0972ef0132b6dc59dd700980
SHA14afe5adfd7887a7959c08fca4303bd75e7becd34
SHA25653c652cba19c874c276c4d79d3f4176d891c6b931aa8d85125241a0fcd5c847e
SHA512c69bf38583715933d02d39280611c8ba7eb4f620caf0bcad3b6190413f6d420335ccbe57567af297e18cbfba414f7599fe87e180c9bf30848be430be19dba299
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
Filesize
216B
MD5cd8612b2a531a56055c47b032dd5f824
SHA15355c7201cd2a6ef2a09824b86f574350e1a6b77
SHA25690b858640ec90fb51d73cbaf6e034ba4ad1762a273396a768a7c2a21f78d8e63
SHA512391b7ccd64ea2ac922e2f4d53c40487fdfd9ce7e9148d7828f8ef1cf873c0a6203120924744530aed4e7f75fe3649ec20e4583e227248496de340a8f73909064
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5be8e0f1e33dd3c54ab939871d4cb8f06
SHA187f2b848b45fe56fb1126391fb8a8415f0581465
SHA256c84152f6e976634b8cf81f65311266e0db84064e4cc81cb7dc2f337206502d18
SHA512fe01507d99d4ff084acebe700d96cbe881e29f4eb9dfab805cee6d0c56dbeb2267fe02f82039af6b3822818ac3ace4cf3fc9950c571865ea45ebe116c679a823
-
Filesize
356B
MD52b6a72e79195cfc052dbf3547742d9ef
SHA1362d787575ffcc738dd93e174a3febb1731aa17d
SHA256988ee1fa81d6c86ab4f6d903e28449ab5fd0ae686c7f740f7c9fcc2972e438b7
SHA512b7571d39fb02c0a9e882bdb0f82d524443bd8893a916ce176571c5b921bd06cf286d41570383ba0fb5b53191344f7b22e752a0998e5ce0e5e58ef398de60f8bb
-
Filesize
9KB
MD53358ca9646298480b6a6de25144f91a7
SHA15c744b26ea36e1f34456261d572d97ba26745895
SHA25683bd0d47c22424b3ab749896b68bb4def032d1d7174cf6e770d6560c93a8c77f
SHA5126c923287eb0aaee6f8aa31c5922cc629836d6663738026af897ebbf4dd6530025fca4651bbc37a8dcbdecefc4f79c054b99433c252369c2fb02cded616b9e8bb
-
Filesize
9KB
MD5983175518586965c7da3d54e2c1fc78c
SHA1ef93a90a94e063ed17032b25b734446118e9a203
SHA256235435d14dff2c0ee2a37a7766fdac4046854d14ca2f114ce73c495853bd9542
SHA512d91a0b4690bb9c9846945f5b948be87e4ed2a6d89779e96a2f159b8ef375a4365a6865b38e3a8c0f7f96f571d00bd8a157b1b5989308d9d1f543812430ff61af
-
Filesize
8KB
MD5b2e4c5eb60568441fda440d7d714b992
SHA13c057b6eb1beb18d24aad8378a8d8a23b85f9703
SHA2560e234ae16fa411ff1022955fef47be8f2dd9b3ab87871c54ae8078809bb30e06
SHA512dbf866f4f4bc40731bde0d9d9b86a7a9d3183ea4d9d6745921d6ced44e0209ef38dd178cc35a00af91daa3ee2beb77e5c682860073087ebf54a2a105c4690cb2
-
Filesize
9KB
MD569375c2a13e7b423d0fba157fb2e7719
SHA1cf837326d581a4a94d2ac73ab9551cc398f4bd39
SHA256847016941b76efceff3108ba4f88e1500ee19dd76b263b29b191c2f6676de854
SHA51202675367d7f67bfc406caaf3201c3ab33f0f63231e5c19c11966a9c6b7c43cc49a866ae70b80ec56db97ff1d01138f34e39fae07083ff2e1b829202cfed67d09
-
Filesize
15KB
MD5e69bf01fc7b75e055dbe2292c09ad916
SHA1d82b86be1fe4a27bec4b254db0b41ae9c7972b91
SHA256fa3f4f60be022444dfa473a754c59d307f8704c7ca19f1b404f094806a83bc2e
SHA51291dfbe601219ec6ee1e13eb493fdb9f8bd746e3e1f678df9717db726fd1f98ac20c77b37bb0a056c7336388981350bb500599c60f09dc4673809b89e3490394f
-
Filesize
189KB
MD5965559a765b34d3813c2f5bd00802524
SHA1eb1dbbe419bbbd6dafd012451e2154697db4626a
SHA2564445a79d90e26629041f295bf7d595200169a173142d39d744676a25f64381e1
SHA512294b692a10785fb5ed6f5345e812e2a2809318b70e1f1d98046a4fd7bed775cc116b2206d97498492e4983cb032288da74b9322781f03e85c62e558bf2b0829c
-
Filesize
189KB
MD5cdc89584ed743251bca17cdd8e453609
SHA1f17726700354e06deccd8142dac4afecfc4da905
SHA256634278c2caea342b84d652ec906b84eac47b28e5904344cffb91a21eafac3d0f
SHA5125f0dfece4dc733af58479b7b0a715793e3af35789d0c4bceec13cc7da778ff20b7a89031e567364a5621ccf5374598e7c992f13f9884561478e48243c68732c6