Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
300s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 16:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://[email protected]:NPtqW3j4tu_qnxrwKVrX6vk0aHacnLIG
Resource
win10v2004-20240412-en
General
-
Target
http://[email protected]:NPtqW3j4tu_qnxrwKVrX6vk0aHacnLIG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580160360980404" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 5044 chrome.exe 5044 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe Token: SeShutdownPrivilege 3864 chrome.exe Token: SeCreatePagefilePrivilege 3864 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe 3864 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3864 wrote to memory of 2700 3864 chrome.exe 86 PID 3864 wrote to memory of 2700 3864 chrome.exe 86 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 2272 3864 chrome.exe 87 PID 3864 wrote to memory of 1552 3864 chrome.exe 88 PID 3864 wrote to memory of 1552 3864 chrome.exe 88 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89 PID 3864 wrote to memory of 1656 3864 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://[email protected]:NPtqW3j4tu_qnxrwKVrX6vk0aHacnLIG1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93e88ab58,0x7ff93e88ab68,0x7ff93e88ab782⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:22⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:12⤵PID:3624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4316 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4320 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4556 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4772 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4092 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4768 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 --field-trial-handle=1932,i,5091044504270270431,8839645396965151183,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD579bc1ad0c7f4a283c2f0a41ef8b59fb9
SHA122989ce8ba15b89777a39d77b764fad2922e2955
SHA256a19ff0a8464f25aaf3fec7ec155e0528d533d458b6676d5923eb3d4f7a149f32
SHA5125d5a6d7d9c7fe13cbc654ad5bc83b743fd790249449bdeb3d770ecf9271278a13a43af7cc6bb732416cb7fcfd028cc90f4c9a029228ed45febfcd43524382941
-
Filesize
1KB
MD504a0d9175de27300bb723bc8f6dd9659
SHA1697a56d378232d230bc8c5404f9c19ebd37e699a
SHA2562c1f5bc5e21d7ba87b876f53516cf7fece7c0aaa67ef1871c8330d1eaa12d3b9
SHA512a281bbbd93ef7aa988b42531d3a355f7e8346742cca9e356f72afa817356ae859201d43d4565fb73070c7ce08f408b2f271f7b0536b0dc8dc68ca2e6cc484481
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5099c227de3963cedca62fe553a28554d
SHA15f608bc5f3ae5af4f64c2bed3da3c7c9e1495b51
SHA25619ddb7bf82aa3428eaaf14f6e806809280be2f305940c4e54cb373d0a02e2f2d
SHA512ce9e2ab36054f2420aa4e32fd07fc279b86684d8518c16fe877df922c7fd6614e33c917a97664273e6371df246ed7370d021e85be7858087ca61270e50abc972
-
Filesize
6KB
MD53504b41079a7dae260a842c3c65e4b16
SHA1524d1626046cdcdb6cb18de1b318376db9ef719c
SHA256ee4b87e30d1b471c34209b7f27fa996d17dfd587d32d104eb47c8d580a0fe419
SHA512d940964a430c1ca584f0db4c47b3bed5b8b46b1ead62449fb9bd6fd54af7aeffe4f67b895a084c3d1b1ddf38aec89d19af0c362bac528e8ab54c02bcb28685fd
-
Filesize
128KB
MD5abd963c33fe2f6791ce3b40385d0a209
SHA18a790b7a5080ea6a121bed686101d311652723a8
SHA256111e9124138bffc678308ba2fed2e9fb9045c5602ceaa44a4430adf455740530
SHA51223b0522fc9551147bafcd85417cc4ef3916e9dc49d9c2751d4666d84b99490158da6dff70713059de87a5a61a3130cc1e475ad0316bb3bcf5100f051e099b272
-
Filesize
148KB
MD5a1e8c8504c733a018a9e822836866b51
SHA1c4173c7e5b12b52b5a9dc8d1114dbc3bdec7a790
SHA2563e21efc6842a9b32492174ef5b9feda63cb615e25210af910ea19680147e1cec
SHA512475135f67c77b45248fb895870ecc972ed6c0c200d901274671948e57956ec430bb2f7c085b407d0bb9a8745d9618dfd7182a6f3b305aee400989d6c33de29dd
-
Filesize
129KB
MD5f1c75903f569c21521a1c56be69b9bd0
SHA188a3f02bba76925e5341ebc6475f1262b6dd1b7d
SHA2569a90984a396b11e5abcb6b6bc0dc60f580c3b160004ff9bc609e0553db5a3161
SHA512cb3eea4df72568c9fdea1f217f657d916fb6d89fc12557182b3c0cae6feaedd5cabbb6f3ec27fb5e46509a239712560474f196d04db0f2376a001b4fe18992b4
-
Filesize
91KB
MD57ddc727f85a66eb482166008302e7496
SHA17b0ef17f2de71f958904b203cf4b492c7d99bfb7
SHA25684a3a5c0608b9aa3aaaa97799f64c342e1742c2616283151195ded34d61374e5
SHA5126b4172003d74453e43040973a40f9ca5cd0826698b4d5f9d783ed3d9af1c28d761b7b23290d96453525482b5b453e45a77940065bb43e59cd58ba0f9245887d3
-
Filesize
88KB
MD5a3e9f8e3b7d3332bab528879b6eff597
SHA1bc0ffbde95c6155013c4a9c00d73be657ac5a618
SHA256b764c70e541e7f59b714c70f7d7d5ffc3cb35d70cb50349a9056d590feaecdf4
SHA512efe78efe0af5a8dc1ea2f37538fb506450df45caf5dcb3666b2a7a9c2ff7bf447e90323ce99ab2c1286561719227a9a8e608d348063379815907c6b007b34d61