Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 14:05
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://view.flodesk.com/emails/66b370b50e649c786cb638e6
Resource
win10v2004-20240802-en
General
-
Target
https://view.flodesk.com/emails/66b370b50e649c786cb638e6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133675131707620080" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe Token: SeShutdownPrivilege 1760 chrome.exe Token: SeCreatePagefilePrivilege 1760 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe 1760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1124 1760 chrome.exe 83 PID 1760 wrote to memory of 1124 1760 chrome.exe 83 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 2524 1760 chrome.exe 84 PID 1760 wrote to memory of 3636 1760 chrome.exe 85 PID 1760 wrote to memory of 3636 1760 chrome.exe 85 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86 PID 1760 wrote to memory of 5104 1760 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://view.flodesk.com/emails/66b370b50e649c786cb638e61⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd8606cc40,0x7ffd8606cc4c,0x7ffd8606cc582⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2152 /prefetch:32⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4596,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:4928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4980,i,5774342424332728192,2729865448440357567,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD57d228ec28103dbba71f7348f8a49cd37
SHA18d73eeccee6d37d4ace3a1fec8450d41604322de
SHA2561b956636d4b520718043e0c71d3821ecedcfdd6cf47e63d3b2993cd5f87d3f8e
SHA51291990b5cf815551ed3a68c3bcd00f22540e00f94e6914ddb8ab178cc315c9938e8328d8e4583049c0d15de2171cacd2da8fdc4ea59ab389882a87b27a2c33bca
-
Filesize
168B
MD543bc9f74e267f07f9de49703c0dc6033
SHA1f913a0c458ef4801cfccac04f910d3c50e67e16b
SHA2564bf16587779e381a11ab998572a5a55e117006379e7f72b12fb68f8f7d1eee1b
SHA51289185975e85c31170dbdeb0f2494dbc3a46576491f9be10b16894b235e1099c7110dbbfbd0cbd1a5ab3c3f787ea35885b84b1dac80bd4a6537d5c0996bd6ab2d
-
Filesize
3KB
MD5849dad2928bf9af8928d2ef54e6acf79
SHA1046380874e47fe031cf5f1ec165abf6c7e2513b2
SHA2565988ff7c72acaf5c7c136fb94f0967b9768c99490f1ed4db6d5651ab379417a4
SHA512722fe598662d10b6745230aa010f1d93408d22d906c99dcf73d284544e3892ec349d599b3837eae990ed7ac8d560682539bf5e917b1a283ebe736162796be6c8
-
Filesize
3KB
MD5855c666935dbe0a5de746a6876a10bef
SHA151f83dd02a3383e1b6bfff21ea23b5275cc64ea1
SHA25677bc803648384c1fa8fa9278be9a9f0656b51dd79bc6dc80b67c6ce3476a59e6
SHA51268c744f6c96280dd8813e7233c674a3251164611989daeab0c9308e92c35fd8079b440578589ec147eb642857815107449e1ada0b6729d5c94915864fa5b3d52
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD589f096f32391cb5ec036023c21dfb779
SHA1bd2826edda55feb8942143140343f9e0b7a38335
SHA256e9760abc7c83650d201b678f295eabb2b605306ff1a0992304b8e4addd6f29bf
SHA5125eeec2f68bfb654aa10fba31be1d1b2cebab35b01e0976f9e865153276d3594ae3b0245e4bbeb456943a3dc76675aed89f7025b2484bec7a169c43ac8cc9c92e
-
Filesize
8KB
MD52bfce5f75f5aef3f25c7c73f1fd8a492
SHA16abe42ee7de6803898b11604bff824a3eb3be3e3
SHA2566429842091c92b4ea79cb47f328a6864c3d99147e7fbb2121db84d337f05a334
SHA51229cba289a439f1a98db917be50694904292e0d96d7c23858839e9f0065946d1590d298596e4e7d858c7783e3e7c4d70b0beb2922e055de7f2fc8b6374749e850
-
Filesize
8KB
MD5aaf80c85322c711bc4867695b4f161e5
SHA1e57f06fbb647c7e4b27462e47247d63258a953c3
SHA256a89bdbebe022ccf4188d655cbb5cf7905c47810c44c3cbbbf68aa8b2c6e3c276
SHA51246987c297f597e866963206a6bb1fea19b74b64b1f5b8832ec54f1286380e92eee9636d38bc14cf58fd9303ff8625c850be4bec094516d620866a196d5955733
-
Filesize
9KB
MD5cd9ef3fbbe4d3db2e74c34fe263eb5d3
SHA160b83262d9c7ced6da48a8aa58dc2fb894afd30e
SHA25651d89c8712e6f93364e035f87d73ea9a1dffe270732c13ffddb92d4143795d98
SHA512741d27b626f54628f8e4395f0f4d5c26e8b096b8329cc33c600a436372a9c04e6a7db4ba6270aa939a669750bd0a0f4cc00afa614f19bb645015f6c70bfeab66
-
Filesize
9KB
MD53b91d5302289b01700bd6c92c41bbbed
SHA10e0cf09ce45267975e60d738fe4a66cfe8213fe5
SHA2561656b7ee5574aa6ff55fb55accc3f64e19e04e29f3ec1a88b8a62d775751c314
SHA51299a68f90e945de69852143c143c8f6c51544cdfea169124b8921fd3c0c599639730a0da0fa382eba413ea34b50ed65ed8bb22631f0d02968e5a8c1fd64251c20
-
Filesize
9KB
MD529c52edcfd3d4c14a78774c20c659d32
SHA1002666238862fe44fce5d896f10ecd9b909cd3c6
SHA2567dddb89e6239319813d20668a47b571792b8a163f1ba45de265eb47dea68c3f3
SHA512bc907fa4652aaa830b66e0490b3e30c3e0ad1a85fa19ece5abcfea01c24a7aa4bfcef259608602236e76d916146c5bf4730144c0592f1c2fba0ac90c24b711cb
-
Filesize
8KB
MD51ff19004267725e023ed1b418c7bbf44
SHA137843689ab437f2d25039153463ba71041562eab
SHA256a66c6bd3bb97fad650066f2ba4e6146e7f32b3c4d46791d6258632389fed0340
SHA5126c95cbd6a4e595d59c5a699a7ffc20fa7d1c6cec1dc48fbb6926144dbb7d4bd65f9c681a74094661f528323042f854b76bc07ab833a9b2e3ae3a5fd31258ab1a
-
Filesize
100KB
MD57d7d49af603d776e9895caa61baa42bd
SHA16d6f5f3496587b9ee3ddebec756b7b6239efce6a
SHA256dc439438cf4e89ad92e92b25cc86249887d6e4dce3fa964ea28a8198fbe27bcc
SHA512f6ce1b856b8d1078787c47de9e38489d52f7132604b604c441c624d31189a49d3025b1254849dcc39a111f6829fb5753ee6c2579296a9c07a87cd15618daa97c
-
Filesize
100KB
MD54c2539d9c85fbc6f8785fa74800a0bf4
SHA12e52a3d37d95b4afe7b8e1ed8b3180b5d1642ae0
SHA256534403d223ca6894d6206df1ba4181267d77d5e9ae2b04ec5fa2144ee167f058
SHA51252db2f2e8ee5c7c1bebfa4b7a83255a524696037b9415ac90376d6b2d9a0c1b0163303c1e124ccb61f1ac06ff2d1b783962892a3db89050692548dcd140e9622
-
Filesize
100KB
MD5c45a9f41ec1fb60653bb9d6bd1450117
SHA1d83cabe5de3f58866d676b307e47b6ed8a2666d0
SHA256fc76270d021d930813c8badddc6d3267becab331f93cd855b485b50ab5136dfc
SHA512cdacf2b9efee8b3b5ae5ea88a016480573f019faa35e484d65b50b2763fdbeb2c2e0836813fec7841c9143d713bfd547061c1e04c816ac0d63ecba9f662f6227
-
Filesize
264KB
MD5187b3134fd4616bb26a685f97dfa454a
SHA137b48a4fe21dca47096947dd19ad5f029b14913c
SHA256d0ea3b121b18ea1a3c633be857ac87d7c0455a85e99013b7cc957d40167c6e7d
SHA5128b113bfc81e450e293c874b5f8168619d5d3f0ca4e10935349bcfdbb6a3e897ca1f1e4c8470b977b8a79a4b57597251c5e8ab0e9b8ce98c60132fac1c3d3643e