Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-es -
resource tags
arch:x64arch:x86image:win10v2004-20240412-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
24/04/2024, 08:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://new.express.adobe.com/webpage/xAXl4WzpNQHfm
Resource
win10v2004-20240412-es
General
-
Target
https://new.express.adobe.com/webpage/xAXl4WzpNQHfm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584211795081733" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 1352 chrome.exe 1352 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe Token: SeShutdownPrivilege 4028 chrome.exe Token: SeCreatePagefilePrivilege 4028 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe 4028 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4028 wrote to memory of 3976 4028 chrome.exe 83 PID 4028 wrote to memory of 3976 4028 chrome.exe 83 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 2728 4028 chrome.exe 85 PID 4028 wrote to memory of 3900 4028 chrome.exe 86 PID 4028 wrote to memory of 3900 4028 chrome.exe 86 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87 PID 4028 wrote to memory of 1716 4028 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://new.express.adobe.com/webpage/xAXl4WzpNQHfm1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffee1b5ab58,0x7ffee1b5ab68,0x7ffee1b5ab782⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1540 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:22⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:12⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4600 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4576 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4604 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:82⤵PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2460 --field-trial-handle=1864,i,10855477987848658413,13211128632657104809,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5fad3efb45b4adeb4a45ddcabc578c7d7
SHA17cdee8e43660f2ea036f9a70a204dc4de29c483e
SHA256f484949948da0f8c4bfade4de703e22ca2fac7c07ac185cb1edaf361dfca37fd
SHA51244725f24fe72e57651acd278a96f1cdeb2aa10947a13f595097d6515acbaba913e784de31ea755d095660c5ef1e6a4d88de8f0c940863cfe9845761b1caf13fc
-
Filesize
3KB
MD525f96c126f806d05dfeb2504c3e674bc
SHA1fb49a72c7ec266664aaadbf9008157113dbff634
SHA256960d85d7718049257f7681ba673b26cd9b3456cdd71b426dbbbe966620b0f0f9
SHA512a0a7b3d7654e8fce1ca639011eb52bc68b2bfe2d6856a95468d2c4b2f1bdb7e1ff48ee23eaeb93ebf90956aa8acfda78e928b69dba5f2031403009ad71b8c6bb
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5fd90ebc54a51ec31db0b11637b8ff8dd
SHA19262f14d7031f37c9d0f8ea31f5a2fe3496e5ab2
SHA25656a74c275e3c96469fd06b58bed6213c169b4451ab45d0680032a67089b7c057
SHA5128deea59f03f9407dda9f5452994fd820631963f95a5df49b3d3523dbcbec767b26441cabf0ab610a94da6781671418fc481c6803f8e35d85ef69350c1d9e17be
-
Filesize
6KB
MD58b68756a08b97d29c509068e0c91ce9a
SHA101a8a12286fa958f9c474b0c9abc786e6ed9c976
SHA2562f34309bec9f3ae70133e99d563dbae587e6bd3441ed7458e17623d871ef8740
SHA51290a3ad7609c335ab5bfc804a533786b43e5f36ee16a530ffc67a9d39a4cb4fa2d5293b141262de5f17df7faacdb155dc9fe07b4b7184c3f7e1735f1c94f70f14
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\5c400b215596d3685ecad16b15a5823d3176828b\2ec4fd94-b2ee-4cc9-84ff-6e5605c40b00\index-dir\the-real-index
Filesize72B
MD548d4e09c7dbe3923733bb850c23545e3
SHA13edb726b4f3052873251a8727175adc8591d7787
SHA2562c555d11072392b4d34454eb874be279e2269c1057bb3a8216b678d19bb6ce6e
SHA5123bb8736885a5c325348c50b601a3c885ecf03af77090d61978297182f426496045703fc365f4d28eb5473b4d4dd8fb4a97595839ef49eee6b9ce7b2518a1bede
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\5c400b215596d3685ecad16b15a5823d3176828b\2ec4fd94-b2ee-4cc9-84ff-6e5605c40b00\index-dir\the-real-index~RFe579c30.TMP
Filesize48B
MD536b013c598a6436549fcb6d981f4c89e
SHA1cbcf3bbd19e72298405e502a1aa25b818f961ba6
SHA256a30dff2699c7e83122b8f94187d7bded2719fca33ee38aee5762c59e487321a7
SHA512b5deb9cf64692cbd3b7f1d492ad366dbc4bd059869e48093bee164b0aba47e5646c837b57d218cd2ab71f1896c4773d75fce86e5ecfbe5acd00e6c53c0d07b05
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\5c400b215596d3685ecad16b15a5823d3176828b\index.txt
Filesize138B
MD5497c0beef18ab8e527d55a7a94fd557b
SHA112b89d97e53cecfa8d9ab29fd7232e0560ae1ab8
SHA2567f210b02cbb1287028f6f63018fd4b6ad59f8e24e4d64a5fb5385e485a49c5d2
SHA5128c87b753f56c6973913b3fa9e0dd27563bfd4dd68ac94a94a21e9a945f449c09d3f74e59ac750e225f2e158aa61f0a7eddda8e56273b1a368ba40e92a00023bb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\5c400b215596d3685ecad16b15a5823d3176828b\index.txt~RFe579c5f.TMP
Filesize144B
MD5bc0ca65e53f592aa6f97b64a00415b2f
SHA12cde195ae6217b59815e1ea27d1449a3efdc9d2a
SHA256b3236002bde58e84f12fe3eda07bfa1438a124ab8af851e3fbf2bfdf72826fc9
SHA5121457b2715e8604ae042b2ddd3d0c366cab20dc683c6bf14cecb940e08fd5cdaf3203c8193055efcf9dcfef234aff8e0ce779a763670bcbb660914ff8e3661bdc
-
Filesize
250KB
MD544cf0414eced72beb1aff2111e39ce2c
SHA1c4e8b35aabe6840493f4016b73b318e66917bfa4
SHA256f43a983e65f31187a2c86110ec1fc6fae4eacb51ef338635ec6bcf4012c3c58c
SHA51225da75434b6505200fabe0b6b3b6c84f75526270fc4d5c8710d495c8c75f8b41319766d0311856e76d2b8df087a51cb11f1d62dcd2036088f86b92cd28179726