Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2024, 18:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.megep.meb.gov.tr/mte_program_modul/moduller/A%C4%9F%20Temelleri.pdf
Resource
win11-20240412-en
General
-
Target
https://www.megep.meb.gov.tr/mte_program_modul/moduller/A%C4%9F%20Temelleri.pdf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576804490409424" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe Token: SeShutdownPrivilege 4912 chrome.exe Token: SeCreatePagefilePrivilege 4912 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe 4912 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 2208 4912 chrome.exe 79 PID 4912 wrote to memory of 2208 4912 chrome.exe 79 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 2808 4912 chrome.exe 80 PID 4912 wrote to memory of 496 4912 chrome.exe 81 PID 4912 wrote to memory of 496 4912 chrome.exe 81 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82 PID 4912 wrote to memory of 3704 4912 chrome.exe 82
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.megep.meb.gov.tr/mte_program_modul/moduller/A%C4%9F%20Temelleri.pdf1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xb8,0x10c,0x7ffb2da4ab58,0x7ffb2da4ab68,0x7ffb2da4ab782⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:22⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2168 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:3704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4164 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:12⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4168 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4500 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:12⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4120 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --pdf-renderer --lang=en-US --js-flags=--jitless --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3108 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4484 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1456 --field-trial-handle=1632,i,8768842265064524211,11289978318413808173,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ec514b55506d34e2ef22977104bcad61
SHA13bdaab8bc75c6385a86241fbead89402a891a106
SHA256b4ace4cc3c612f091078186d35b301b417ad8022b5162d8046cadcaa973b536a
SHA512ea7c687ba8e811157d3103fbc48913b298372ae949829d3517f7e839d61e79c8e9e4a1aa9c8845bfb2d425eaeb631197bd3134a9f9d4d80570942ae280237f61
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD52bcac9014fcf2e5a1fae4de89060eea0
SHA10545b88e6fb1f7a148e78cb3c2f19099b7c5d408
SHA25648a0b24fcd710f5f22bad7ef2652df4622aaf838ac66ade9f6d26e6b4674d4f2
SHA5126d1a2388725db2983b673d8f293965df5fc05e4d8a3c0a5fe2c83e909a22f8f87106d6ea4b220dc500f6ab751cf9d558fc35b8e6c45b8cee48b774a098998911
-
Filesize
129KB
MD5c35ba431c635cdd2a963538334c2d924
SHA1a052e71f243109ec8c4ccae465be45573ec3a96a
SHA25676663fedc335f76d1242f2e2f38c5079bccffbac06ffc15fa5e2126b82093636
SHA512f01ad85287f1dbde460439bc805a137f0f1e87851500995e271cab0b2dd199e4b54d771c4322f5bc36029f934c5404607e77e298bb6a5d253ed0cdcfb8cc949b
-
Filesize
148KB
MD55a18483f3f6ca9f901a3dc80d8dc77f7
SHA178424b2862c293fe3e64c6d5201e49554ec7b2d4
SHA2566f89743a89e0c4021eb25027a79afda06df38b023367baa657a9bdacbd03e320
SHA512a895cbab655be26e90c69fc7b4efc64cd9124fa2328aab2d269605d1332be0aa8af359f6e3a735c8bc16fb8a1dbebd6a5e9f9d362add4c8467c7b6e9397bc1dc
-
Filesize
128KB
MD57e80f9729127bac97ceeedba9cff4497
SHA12bb873d4208be3597025328102873d9fec1afeab
SHA2563ba0527fd1712564ad111701e41d987f5e0ede62ea04bd89b153caccaa7415d8
SHA51248050fb8dfd731ce9537c591e6334ca39aaceb3c9ba2ba8ef915c87bf70b445c3dba27a5e2aab4dfbcdabd226250bf21c5ac27f67b614d06bf6f86740bd6e770
-
Filesize
129KB
MD5ecbe76c344e5c17b96810bc64acf0dd7
SHA11232011ab730452504d73d36c21d8713712464ed
SHA256d8590214f9382512acfb7d65134731d8d04cb0bf8c6f83876525dced1b436460
SHA51213e05feb0e5d3e3877f65b4ff27aad2b15b5ef3d5e30ac3986c130595f23a9fa10e6fbb2a8380643cfa05e27e2f8ed8fce6ae6149080178b76037036870a677b
-
Filesize
87KB
MD53017c4c7ffa800fcac0644e61926bf7f
SHA1963f3e46d2c5de3d48104b599689f033b0af808a
SHA2564f09a11dfd61e20f49fb7818c86e921c52e739729305b310d195794e9754d865
SHA512d5beaed220c8580ad7242a31dbeb1114b03df8c5b048ece9ac25616e4de69b4296639584b51cf953ded885ec761b6cb8006d18621074cc432815b1cbfd829c30
-
Filesize
84KB
MD520dcb536386801ed7dd690988d40501d
SHA1999097271a4b7b77297e1b2bdaa49a249534f95b
SHA256b1dac8d7f5327e5486a584dc8257b216711349162bc1a0e267ad9af92338e4da
SHA5126b5389873e177bb0f774c6b6d49398b4b18884a50a30cb41247b3c03a5ebb061a351f0b4be51fdc7fa9c578c3fae90106203f3b7beb86825d11cb9560519c34d