Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/02/2024, 13:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL
Resource
win10v2004-20231222-en
Behavioral task
behavioral2
Sample
http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL
Resource
win11-20231215-en
General
-
Target
http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133523927872442217" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 976 chrome.exe 976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2136 2900 chrome.exe 76 PID 2900 wrote to memory of 2136 2900 chrome.exe 76 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 808 2900 chrome.exe 80 PID 2900 wrote to memory of 4292 2900 chrome.exe 78 PID 2900 wrote to memory of 4292 2900 chrome.exe 78 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79 PID 2900 wrote to memory of 4728 2900 chrome.exe 79
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://email.mg.myscoot.in/c/eJwUyjuOgCAQANDTQElmBhApKLbxGht-KomIQdzE22_sXvGSi17SLHl2aMBYmA0g350hhaBBrnqFACprChNMOEWyQAo8L44-ECr8IgoMOs0BpLEYwAbJFNRN1PeOrQ1RTn64fYzrZvKH0cJoqW_POeWenthEbJV3V9J71rZZ1ExBufxe_rJofePDxecerf5WX47_AAAA___P8TUL1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff803fe9758,0x7ff803fe9768,0x7ff803fe97782⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1976 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2128 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:82⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:22⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4668 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4680 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:82⤵PID:640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4880 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 --field-trial-handle=1832,i,7888493597384466672,8989314863821698911,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD50426f8923da744fe6bba975487d1f19a
SHA18f4ac9d7b1a80249013d47a9d6e719087b0d8e76
SHA256507770f9bedf85f48503b4787475f0a76947fed49499472ebdb8c22e84853fe6
SHA51250869306a885c06e009d73b726c8417d1e36c0f841b6416f1d9b7a1b710e6e2ae28b3e083e47ef1e941302bdcb8ddbf9d9fd140ff40579f47f6227a3c04850b2
-
Filesize
120B
MD5fc1e46b9639cd2e98b16c7a780b577bd
SHA1d4cf6797f7773f30a32d83cfc1addfa79bc06001
SHA2564b6a77bf57c8c470065a660adfda47042860e1f96fae870fd3474b4721d28265
SHA5128746a289d219a898326b6f85891aeba352a1a7e227987d7895ad2446c6113fbf49263e9928dcc7dc22bcff7696cc9575fbe238060ac5aa594202d95c56a301cd
-
Filesize
1KB
MD55a1cd6c62f4d6cd31db4b5be0add197d
SHA19a80993c156b502512683349240406755d1eb4ee
SHA2560585054634687ffa278626cf7e8088e3d03d76f4ef1c2af4b244db021acbbc02
SHA5125a3a59d365e0a8d9bf87b4557e19b33d820922562402277a9d84a279eafc3fdd9e28958988e9cfe3cdce957646777f53332cd8468f746585eb851ed30fd65132
-
Filesize
6KB
MD5a8d8d147ce22357a7d28c6b0cb39e63e
SHA1f3826c44349b5ce63337243485180db6de06f385
SHA2561f6185402c6eb46db85dd56509afab75feb43f9a9d37121011ca8688b4d79ede
SHA512a8c92c0396c006aa6f658464eba9710a3ab6346d97b1858af64d5c77a93873ac7797872ac740d8e7a69855e57d9cba72924a6c0419f0f22ab7fb22281348445e
-
Filesize
6KB
MD5ee71fbe84b00ec8a89f8beea3ac4ef97
SHA173b8dab162cf038173c2957112d22f8529f72eae
SHA2565b896f951d96ecd395b79df792ffaf6d4cbc375f878bcba23558a266e3996217
SHA5122a6503858282e474ca2e60f850998fa1a4af170e214cbb4994ba6f97d937345fa99853fa4daef96abb6a8f675402da4f14c9e3c2b97f8aa3c0c283466b5aaad7
-
Filesize
6KB
MD539562fe616e58a0ee51ff3a596e58ad4
SHA12124e61a6f9ef525bfe02daf7de48cb15dc48652
SHA2566f1e0e517b4a939c0e3425183a145538c59426445cdcc9f763db052c03c9d855
SHA5126c729ec66696802b2ea162446f9501ff8edabe44cf90b06c36fc9273911464d35fae096159cf6d55fbd534940ca2ef3aa1933e1b191256467f1deaeba5cef3af
-
Filesize
114KB
MD5d7a92ac2bb2b68b45a54f071e781decb
SHA1d3cb662665968480147569bee7431440fe28feb8
SHA256b4de9f58b0d034c3768d5371f8a0b979e4bd624f9f1e3ac951211841665845c1
SHA51281a5af627aebc640bcb650de9ce6901153d44b0a6cfe3a55b148607a910e42fe347d52161d0277eead7bebd0ecaaeeaf21bf83d032ed4aa24f4ead26b6e6fdf5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd