Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-09-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
FHT65609567-TVS09760-PFT09790979.PDF.rar
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
FHT65609567-TVS09760-PFT09790979.PDF.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
email-html-1.html
Resource
win11-20240802-en
General
-
Target
email-html-1.html
-
Size
781B
-
MD5
c1034815c27ad1ffb932d85a848216e9
-
SHA1
4d94f37740c8390c84499103ceaa80b66835d933
-
SHA256
c04276e629aa37205267ab140ab1021bf2019d8ed8d871b9fb7e2840c14274cc
-
SHA512
38a09350ea171d83ac98c345218b255c8b924d951b0c152da891c424e26c47c8f96f3ca7989248bc7d9b7d43458ba32fdcbaed62f2bf672402e33dea0da1d5d9
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133701408466297935" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 1348 chrome.exe 1348 chrome.exe 1348 chrome.exe 1348 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe Token: SeShutdownPrivilege 3536 chrome.exe Token: SeCreatePagefilePrivilege 3536 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe 3536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3536 wrote to memory of 3556 3536 chrome.exe 80 PID 3536 wrote to memory of 3556 3536 chrome.exe 80 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4552 3536 chrome.exe 81 PID 3536 wrote to memory of 4692 3536 chrome.exe 82 PID 3536 wrote to memory of 4692 3536 chrome.exe 82 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83 PID 3536 wrote to memory of 4116 3536 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\email-html-1.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8d9bcc40,0x7fff8d9bcc4c,0x7fff8d9bcc582⤵PID:3556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1760 /prefetch:22⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2084,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:82⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3040,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3496,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4748,i,1228508134178594517,2338981050428392812,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5d6520adeb770e5860bffabfaa9ecb25c
SHA1dc33441697e19f50478b2c583312d7dd7c16b478
SHA256baf7e9b63932710fd594c25d9b1c8d8ff0c844c88a3bef9c857db38f00c12c74
SHA512e0e4d9cc1780487cad4fe6e10cfa252b0acdad383c84c64cd5ae90afeef42fcb1265691122c09c9fbdde1cd925a7b544f4e5e7e63e9ddde18870772601728835
-
Filesize
962B
MD555007e1c50af1dd2fd9e873a4a4d5546
SHA145e5408efc7a7c1826904b026606cfbb7d123b0e
SHA256df179a0b3e1258ae953154a05c87e1d52b0ca3dfd60a09e7f53736926fcc6091
SHA5128d4a38702593c48ccfb87ee9b227570ef8fe77b6c96a0d26d1b9af31d2a85d3dba4b34a81d78e346cf602979d9d0c6935b41245beaf1df96cee43734b8785399
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5023564860b9b0a9c3cf20c8aa71afff1
SHA1b3e98bd91f1a9fe134a0136619e6769eaa0a431e
SHA256aea484533962c19a6a23e0399ca7b049d1abc85a13ee098c5ab75eaa880f6524
SHA512c231c6ef7ab950fd81a4918dc7b97505d2ab7f3adc8fdb89260168a864368b971eb61f24f955e8e96a4fcffcba9899cef1e99acb834df2de77d3efd5bbb48000
-
Filesize
9KB
MD5cf53fceccc025cb25ee661cb108ea764
SHA1768216946fbbc511157c26af12d0154c93e65200
SHA2569576b99c5e46294406053d5fa11334c1502f4a591f09ba10817050c9b4fc7bd0
SHA512d8583ef0965415ddb9ea8c1748207ace30196d99a04a9bca265446c08a6428cbce75f177fb5d8b904c52f8f874f02b7789c3e25a8b4e89da18d82946b6b1d2b0
-
Filesize
9KB
MD5a3e68ddac6879b89f13c09e69d073c60
SHA1201a3ae943201ea5887c725c93c7fa69e74da6e7
SHA2565379f3e0391d0a2c1bf155294e22e757795d4f07eb3fded12d17fbebbaeeff15
SHA51204a2846d52e2b03528d8fd2215195d08deab32f424cfd642b39635f5fb1ef4b160840a094c45500dadcfabb9125a97e92fa0adb193de8ec4cf141f81186d882d
-
Filesize
9KB
MD59487116e2711af3ee19d01c6344f2c77
SHA1fa9f1ebcfe6ee051fcc925f3936cbe38bafb932e
SHA256d3191b0642aa500281b28c4a78b31828f132cbd4b9ad441b5895817df93267af
SHA512ce7c3f64601ebe33ab0aaa41742a0d7b06d1410fc7cf67502e7bcbfdfe9ca0ce12e9f18a63073ee4f98ecd517f9274e6fe5f9de4d0789452d8209ffcf1f2a6f1
-
Filesize
9KB
MD51c2132aceaae6330822fbbb0218fe3ce
SHA18730d45c45e98f0798c670d80428812cc673f689
SHA2568dc8b591cd4f19902234e9b217f0be431839c6ea9b632afd0fad1fa05afa12c1
SHA51213d29df08a6db7a75c3f395c6c486a2beaf70c12d9edbb4678a8bf26ad6f51cccef94f5770b7b85b28158ef8bc1ddbb440a718cf55221f768647b2a93149e445
-
Filesize
9KB
MD5674bf49946fb34adac9aad994d0ce291
SHA1bdd8a63a32286128f7cd9c58b8d219ce2d2bf0fb
SHA256094f6a7fb76599798d78299f272c938ecb1ef98a405722c1f0b329cca1116e0c
SHA512378f99ea36c28a7e8702d264853d6f61089e7fcb0fed33a9d7cb177f202c214e36123952dbba40ec13f61bbb007f374128a1e7d52f3aee7a8bf76c363699371a
-
Filesize
195KB
MD5b32073ef510dad3e03abac8ea4205841
SHA1e7a231c2079a99846627dc8f2a810cae3133b063
SHA25676cd8dc021c317d9be97858e92995d8dcdbea16f5437546ae39177c41729cbfa
SHA5128e7ba84849b8000bfbfb4382d08dc50092a7921bb9726c58a677b722276613391f9024c39e5f6f952f96cccddb50a8c50cc6a525fab235546a630b38baf8281e
-
Filesize
195KB
MD5e1ab48176c22e62d176afae59da79535
SHA135ec2c95d291664ffec23e37998c6b1458401b0e
SHA2564b9d3e7c76ad0439b5f2510a6778788fee545d131d42896ec47b67c44674ab7f
SHA51209c5f11dc736232379fd550bad50a6820055a43f4080a51e1d79a1081e61f9322d1081b6f1abc549c9c870cb46777592e44f480ca912a70b22158cc5e811791e