Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/06/2024, 17:54
240612-wg2h1axglj 112/06/2024, 17:53
240612-wgd3psxgjj 112/06/2024, 17:02
240612-vkdqnswelm 115/04/2023, 14:04
230415-rdq6msfh2s 10Analysis
-
max time kernel
600s -
max time network
579s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 17:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://profullcrack.org/2020/08/06/bandicam-crack/
Resource
win10v2004-20240508-en
General
-
Target
https://profullcrack.org/2020/08/06/bandicam-crack/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133626899068359277" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe Token: SeShutdownPrivilege 2800 chrome.exe Token: SeCreatePagefilePrivilege 2800 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe 2800 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4920 2800 chrome.exe 82 PID 2800 wrote to memory of 4920 2800 chrome.exe 82 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 1776 2800 chrome.exe 83 PID 2800 wrote to memory of 3876 2800 chrome.exe 84 PID 2800 wrote to memory of 3876 2800 chrome.exe 84 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85 PID 2800 wrote to memory of 1836 2800 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://profullcrack.org/2020/08/06/bandicam-crack/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff99039ab58,0x7ff99039ab68,0x7ff99039ab782⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:22⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2240 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3020 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4400 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4680 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4820 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2996 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:82⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4644 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=1620 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4120 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4088 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4408 --field-trial-handle=1920,i,9640621854732767636,14942139560992721311,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5014af076929b653568640997b395a535
SHA18bef77f5d3d91aa6708d6f790a2bede405ddd411
SHA256315332f7b034754bc895638c66ce3ac29e1434068e83cfd65a02f9756ae54518
SHA5127f31ba704036e794de1b569c6225b444b4848d82038f4a59b3d858055fc4b648f0a711bfbd32085bec25b1f022c176a5a69c05b08f53c9879bcfa42a050a28ce
-
Filesize
257KB
MD5e2d98b6c29c4b866a1e32a5022dcc01a
SHA1c7350a13b755f206f229aedd9962af578aeb58b5
SHA2567b94e4ba1189e13a2358152063ca8db2194d1c69bc38fcf135540c432a5f96ca
SHA512d7b342c12736337ce2eaa58d57acbbc373ca964fa2c99140ef42de66486748da172474f7c41cafcc4656890b8a9aaee3ec14f623f2427bfc7902781d9e4ff21c
-
Filesize
257KB
MD5725823b0fd5c69f9259f35c0d84af36f
SHA15b921ecd63ea66e7a454eae5b0bb4ba69c7fb639
SHA25683b7cb0119e589ce28dc55eb4eb09323a1e917b9dbc79364bc3a39804af0c026
SHA512b83d05a48cb88fc78d46c8e59e2861cf7006b32c00722b7070568047d7c5bced6e43c7947402754ffe790dec48d1d2f9938119867e0f9b63cf92af63bd8a9aa9
-
Filesize
91KB
MD5077970196ec3170edb433d3692ff630a
SHA111fc26735d5e44757e3c501e047e2b7913507161
SHA25647bae22215b84e99f463345506efc312fcf01a55c3d5fd309b7ea07ee5137dae
SHA5122e0b38ae615e33e6dff19ed0803c81fdeeccf91981d2010123257aff97c0aff35496d8bd94d1bc6eacbe3b57e1ad3a7bc1c0f92c90480afdcc0141bb82aa606f
-
Filesize
88KB
MD59c91f7baed153f12c581f8595cab542c
SHA18393fcb926236988c4343c88e63920d325e9225a
SHA256000fb1f3c71da4bf398c5de60f83cf4b132485c9ae8eccee3a250f9ec0362f18
SHA51235fb6ff7b72679c092c1807048eba8601b32ba0f804e652992e58bcdf6cd8b03c33999a11c7fc2d295f58adcefbb3040e43b92a04f550b75721b3af164996bc4