Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 18:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.evernote.com/shard/s737/sh/1c73af7b-1b8d-bbe1-ab84-a37ee8eb1125/PZrKTueVn1TCv09Q8GKdSUPswy5pLlnVuMS28CwhLbSKZ9L3bLjU05mcuw
Resource
win10v2004-20230703-en
General
-
Target
https://www.evernote.com/shard/s737/sh/1c73af7b-1b8d-bbe1-ab84-a37ee8eb1125/PZrKTueVn1TCv09Q8GKdSUPswy5pLlnVuMS28CwhLbSKZ9L3bLjU05mcuw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe Token: SeShutdownPrivilege 4676 chrome.exe Token: SeCreatePagefilePrivilege 4676 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe 4676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4676 wrote to memory of 2228 4676 chrome.exe 67 PID 4676 wrote to memory of 2228 4676 chrome.exe 67 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 5032 4676 chrome.exe 81 PID 4676 wrote to memory of 4372 4676 chrome.exe 82 PID 4676 wrote to memory of 4372 4676 chrome.exe 82 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84 PID 4676 wrote to memory of 5084 4676 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.evernote.com/shard/s737/sh/1c73af7b-1b8d-bbe1-ab84-a37ee8eb1125/PZrKTueVn1TCv09Q8GKdSUPswy5pLlnVuMS28CwhLbSKZ9L3bLjU05mcuw1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa27079758,0x7ffa27079768,0x7ffa270797782⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:22⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:82⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2872 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:82⤵PID:4080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4592 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3080 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:82⤵PID:3908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5324 --field-trial-handle=1844,i,9424792775780098069,8172657754490151836,131072 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize290B
MD5598c6676f9b5dca878ae8d7721e08701
SHA13f146280f39b6a49fbac5c6c39b967aea87b325e
SHA256c6aca40dca7df4c459ca6d5778f2c41d26dd365c626c843f6cfa323483e6eabc
SHA512a6581e3bee261facf9f41cc0e7898dfd1155b05ee5ecee0705074070fc089f1ce7a1cf7e74ecf7e5970becff7172c85139b87e47840b3a24422229be58a22f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize290B
MD5598c6676f9b5dca878ae8d7721e08701
SHA13f146280f39b6a49fbac5c6c39b967aea87b325e
SHA256c6aca40dca7df4c459ca6d5778f2c41d26dd365c626c843f6cfa323483e6eabc
SHA512a6581e3bee261facf9f41cc0e7898dfd1155b05ee5ecee0705074070fc089f1ce7a1cf7e74ecf7e5970becff7172c85139b87e47840b3a24422229be58a22f4d
-
Filesize
168B
MD5a485d66c2a79b09d5315a2746df86a76
SHA1fdcefa90099b2eac5efded1a5be9df51905da8f7
SHA256bb2267f445ea02a57a99a63e0de3308b17f71344ef12b3cb7216b6f99b6122dd
SHA512125243f9047f83387997fa654666cd32e94bdb4e0b4f0bb97f19a4676da1b5121337202f6a92fbd04c7849bb22f37daeb0de6fe65fb6fbd0d159cf68cbc04232
-
Filesize
1KB
MD5c414af623d3cfbf54c4aa2c72d6e605d
SHA14cdcb327e870b766a0e672bc7ccb15a0b9f97257
SHA256c70f7f26cd4d13e14099089aebec6766c718829184efae13990ffb1dc6a09572
SHA5120b7b1d63491015f120b47f011c6d0089e98de218d5f0626d2b4804b5b8d695695e38e0b07f2e5b86cacc9d92156a6bd331f3b53d9208ddb4c10b644a1ad18c1c
-
Filesize
861B
MD5e9efcd864c493b6622206579688005f0
SHA155255dd2b2c2000aa2ad6991deeae507f7f9cc33
SHA25615985f88a525b3d7072257d0f9b5d6366013367b74bd8e4478183573de6330d1
SHA512629332a45c614cd5d0c36462c59bcde9fe956f45441c3155ec1e900ac39b9a69c11f14a3f992cfc0c846b7bc92e7fff800fe6173481e01a57ecc923c5a43c67e
-
Filesize
5KB
MD53b62d1af3a06162e83c99413498ec681
SHA1a011fabd4088fb068855cef5e31d7a01bfc76216
SHA25675b148ac025777a41e3d6290bc282d326a75ab6bf7c00adc343a597e1dc6947f
SHA512f6e10dd2b4494819941872c886fda3b4b675caf3bbe947b47ec50da7fefd6fcbf67cbf236528153126a88145a102b5da07f4ba250b9fbbb8292df594f06e6e72
-
Filesize
5KB
MD52918c4a7b883904c7b30ce90e8a5a99e
SHA17880baac99f24b357e20e4aabc78671cf56d9dd1
SHA25674846a2e6a019a5e89d1f92355f3aea1f81e3baead069c889533f5221ab3c80e
SHA512ed5fc596bf48d1a5d1021b57d599b1b1733e4a02a0d3fe607c175cc6376769f9963c7c3e614821f0940d1ecd6d9c6ebe70ad2edafd4c801d10f9c5c2457403de
-
Filesize
6KB
MD5d6d1aa656c4ad74a04170a3b61dbc23e
SHA13f6827df941b5ee5e96ea9dc5a177fab687869dd
SHA25677b44ebc7e38564a6bf9ab09ef6203aec59fb8518ed6e3aa2c219755aac99ee5
SHA512a75a592e313325037c592a79972bbd512525bfd92e65e43af428b3ebf5611b6487962a08bd784933699be0f8bc63998adc1cc12a8bc105a1d26d49e255096b6a
-
Filesize
87KB
MD59106e1e186100a4847b9b0558fc0332d
SHA1fd22b70da09354c89b36c6bbf1689ec8cacd9ae6
SHA256eda9a3f287e151b1ab773e7d25f53d88627b4fb5d22204c2667e33652be0bdd0
SHA51255cfdd7dccbe1fcdc5ccddf14166d30e9fe6dea9249752b667b0ebd7c4e2d6cc80640eaa216d2991db5372175f8a74d3dda14cb55f740dcfe3c2a10ceca9da69
-
Filesize
87KB
MD5494ccd3fa3a9066dd17feb7708ce1d2f
SHA153b92877585a541dfb80f50677ab1493bbda20ac
SHA25647a23f6dae77e20356f8f908e397574a28916dd161e2600d5eefec7270bd60bb
SHA512589429ae379cbf6f7d5664c83e82e06b03df1a82c53cbbbbed9339f61945df256e50793787dbe5961ce53fd2acbc693e11daf48861cc8a5be2b51d5d34eb911c
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
926KB
MD5b6f1586dc5aa028e397b49b0907a71ad
SHA124712ac006036d0f583f8839120591cf7de833a7
SHA25683b4d3040f09319d723f79d699ffe1723eef8697e6c7a651979956ea234f5a50
SHA51292d91665ee54a594b356566364cd88651dfbbb4a5b326c5927c3e9f501b9256613fd2ded9f549850cdc31fa8df67dfa09e03d655c4604eb7e5c54e900d8e9985