Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 03:33
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://r20.rs6.net/tn.jsp?f=001CpoPQrxvgrsglt1X5U33BF1hznj2tdEIY_au0sJ0G1qquORNXdh3KPcFMpwdN5VdrFPSN4S_6WtmW0t6OcAru0M59drOcEMFuaH0e3yJCQQ9WIcKFFdKy8_jTKjORECVQ9wm9KjDeQL4DlExHDAyeWhoaJ3LUOhlB0rg-kGaYr8&ch==&__=/.filepage/vivi//[email protected]
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://r20.rs6.net/tn.jsp?f=001CpoPQrxvgrsglt1X5U33BF1hznj2tdEIY_au0sJ0G1qquORNXdh3KPcFMpwdN5VdrFPSN4S_6WtmW0t6OcAru0M59drOcEMFuaH0e3yJCQQ9WIcKFFdKy8_jTKjORECVQ9wm9KjDeQL4DlExHDAyeWhoaJ3LUOhlB0rg-kGaYr8&ch==&__=/.filepage/vivi//[email protected]
Resource
win10v2004-20231215-en
General
-
Target
https://r20.rs6.net/tn.jsp?f=001CpoPQrxvgrsglt1X5U33BF1hznj2tdEIY_au0sJ0G1qquORNXdh3KPcFMpwdN5VdrFPSN4S_6WtmW0t6OcAru0M59drOcEMFuaH0e3yJCQQ9WIcKFFdKy8_jTKjORECVQ9wm9KjDeQL4DlExHDAyeWhoaJ3LUOhlB0rg-kGaYr8&ch==&__=/.filepage/vivi//[email protected]
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133504544072710391" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe Token: SeShutdownPrivilege 3088 chrome.exe Token: SeCreatePagefilePrivilege 3088 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe 3088 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 756 3088 chrome.exe 65 PID 3088 wrote to memory of 756 3088 chrome.exe 65 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4508 3088 chrome.exe 88 PID 3088 wrote to memory of 4188 3088 chrome.exe 89 PID 3088 wrote to memory of 4188 3088 chrome.exe 89 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90 PID 3088 wrote to memory of 2044 3088 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://r20.rs6.net/tn.jsp?f=001CpoPQrxvgrsglt1X5U33BF1hznj2tdEIY_au0sJ0G1qquORNXdh3KPcFMpwdN5VdrFPSN4S_6WtmW0t6OcAru0M59drOcEMFuaH0e3yJCQQ9WIcKFFdKy8_jTKjORECVQ9wm9KjDeQL4DlExHDAyeWhoaJ3LUOhlB0rg-kGaYr8&ch==&__=/.filepage/vivi//[email protected]1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffce6099758,0x7ffce6099768,0x7ffce60997782⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:22⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2000 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:82⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2212 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:82⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3188 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4020 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4840 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3172 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3164 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5112 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3888 --field-trial-handle=1936,i,10122838638741775717,1682092664528249805,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD550a5342a0f67b57664bad9e4457e8045
SHA17411cc59b93372ace9a0949cd59ad892efe538c1
SHA256bc86f5f8f411f54c214a322a7c04440b105e2079e70a0c7bf9f91a8b926fb8a5
SHA512edfb91519e9980794e0e8bfeaf082339e81414a0379be98de2444551e620776daede419d9d6a76e32a5f57d2ed85bbcde13b7cad7ad4c25bee64f3772e46bb28
-
Filesize
216B
MD5d3bf2bf3f2f55aaab6fa19fbdcfad8fe
SHA13ee0867ffed7951e0e0f79de45450f965eb15a6e
SHA256566c0108b7de5390feb93f2279a2cac6bad6aa7aa376069dc024fa4008869a43
SHA512db0846783796735f504ae061433dcedeeca5e3728a36f20ce86fa9b6060f5e4c8cad0812bab96fb46d5447fe4f77e5f3e4680db3d5819b1957b6e6430f779a14
-
Filesize
1KB
MD5fb71605d2383a948ce9d435e51be5ed6
SHA1e4c3a4d4d313033ad0c1a9fc25cd731c5bc2c726
SHA256ec65ddb8e721f9074684f1504dc83072063afa5208499936b08191c9d886668f
SHA512f73c0d644b07d9ef890c221fc1f119f528ee0fa12f70284f1ffd994a644268d448ba792c6cc5a95f33735f26cca5f243177eb138c7fde3c3c4beef48641df289
-
Filesize
539B
MD57be1defff4f090c35f6e475fa5467102
SHA15f74a8b41f10f19f2b31bf67c8646e1f4b533561
SHA25603c2718747aab1ff34299a12217fc3749e99c10f93cbb41c4f435934906e0d54
SHA5129d6a324dfbb99d29645c2e416dd193a41442d303703b68cfe634d4239949c7a37739e8927a62409b9720faa30310c09deeed28e9684eabc45a9a493f2a4a9e4a
-
Filesize
6KB
MD5c019f122acf361df1df68bb757ed300d
SHA12da4d61794382b5390dd9a187d44d73b9b8758fd
SHA2565b1801136dde98b02c918b802b28c77adc7e4e51ab34534908bab32559ef7660
SHA512edd86b682af8e2f372391bf84f0d61cf6692068045cacfd6e7e260ed4f54481f63117dcfa3cdb69f069e022a809d2a12b840481bac54588f978706922a7275b3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd