Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3SteamSetup.exe
windows7-x64
6SteamSetup.exe
windows10-2004-x64
4$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3Steam.exe
windows7-x64
1Steam.exe
windows10-2004-x64
5bin/SteamService.exe
windows7-x64
1bin/SteamService.exe
windows10-2004-x64
1uninstall.exe
windows7-x64
4uninstall.exe
windows10-2004-x64
4$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...nk.dll
windows7-x64
3$PLUGINSDI...nk.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
SteamSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SteamSetup.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
Steam.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Steam.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
bin/SteamService.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
bin/SteamService.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
uninstall.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
uninstall.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ShellLink.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240221-en
General
-
Target
$PLUGINSDIR/StdUtils.dll
-
Size
99KB
-
MD5
98a4efba4e4b566dc3d93d2d9bfcab58
-
SHA1
8c54ae9fcec30b2beea8b6af4ead0a76d634a536
-
SHA256
e2ad7736209d62909a356248fce8e554093339b18ef3e6a989a3c278f177ad48
-
SHA512
2dbc9a71e666ebf782607d3ca108fd47aa6bce1d0ac2a19183cc5187dd342307b64cb88906369784518922a54ac20f408d5a58f77c0ed410e2ccf98e4e9e39a0
-
SSDEEP
1536:Lyy+HcFWrX52XWcS15c4DBVOw/bEQvWt6uouMw5m0mhdBu4NpBTvO7Fvo6mVS6oN:Oy+8ozImcSNd1YHbMbC
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1088 2040 WerFault.exe 28 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe Token: SeShutdownPrivilege 2664 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe 2664 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2236 wrote to memory of 2040 2236 rundll32.exe 28 PID 2040 wrote to memory of 1088 2040 rundll32.exe 29 PID 2040 wrote to memory of 1088 2040 rundll32.exe 29 PID 2040 wrote to memory of 1088 2040 rundll32.exe 29 PID 2040 wrote to memory of 1088 2040 rundll32.exe 29 PID 2664 wrote to memory of 2516 2664 chrome.exe 33 PID 2664 wrote to memory of 2516 2664 chrome.exe 33 PID 2664 wrote to memory of 2516 2664 chrome.exe 33 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 1184 2664 chrome.exe 35 PID 2664 wrote to memory of 2696 2664 chrome.exe 36 PID 2664 wrote to memory of 2696 2664 chrome.exe 36 PID 2664 wrote to memory of 2696 2664 chrome.exe 36 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37 PID 2664 wrote to memory of 1120 2664 chrome.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 2243⤵
- Program crash
PID:1088
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67e9758,0x7fef67e9768,0x7fef67e97782⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:22⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1512 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:22⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=988 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:12⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3836 --field-trial-handle=1104,i,2680703866885423531,10627962962198331875,131072 /prefetch:12⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2084
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD56c065bfe84d07c957a867be1d3a82908
SHA114836b2dc1405001b04026d954c8664d5832bbcf
SHA25622f24cdd627d6ee154b9b961fdac4a4e122f40afc78aeab3398169d02b927dbb
SHA512c9efdd8a1e24ec0a7873c1577683317263c335bff265ccc13e08d79a6d4d9fcaa493a732578824a1988f4ca966b52c17074426f23cda5da744c156f9c812c2a9
-
Filesize
4KB
MD516b37d50fc790b0c963479e5d25a34f8
SHA1e91e706a53a4906c1da00c2448cfca06b5d39232
SHA256e22f1bed406bb001c96aec92784384685cf8323e0c1b7300330434176a7c7258
SHA512e627cf2174b85813517d3fd20507ca4ecff0efcfefeef2d366d113ebb21b52d011d3d13e9d4bcd5325f6a2b0a377d5e6fc29d0bfa9557df4396c41936887156e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
257KB
MD598a3cad4b2c84f91fe829be177170312
SHA1deb3af3f09c1b6a16ff54aff37315034baa369bb
SHA256183e5596df725f14d50ab21df2a69a6938b7ab983dc88b14332661b0c7acf86b
SHA512605cb31ac656f9ba2f5e775214fc4c908c841117c47614208d066e8217efe1b16630b5b8054217119343df1a0b295205b3a59c77544ddbb6f0b145e3704dff4a
-
Filesize
257KB
MD54ff02c5f366e49808c22130eedc317f6
SHA12b312f9a50ba95f33f1ce685f3643da77b6327a4
SHA256c49ab917167e908b105ad2fb75025857c4faf090830b3136fa6ba6f92ce54f50
SHA512e237d4df0bbcc8ab856568b843f375b40d56c01d33d8302ea9b01dfc037fd39861f80c890a84f3b6bcde15882c1896e9bf9e06abdadb34f01065182b602f9040