Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.js
Resource
win10v2004-20240508-en
General
-
Target
sample.js
-
Size
82KB
-
MD5
e7714fc3949af0aef44751d4bf2697f3
-
SHA1
252cfa57a5eee7d154563abd1cb80ac8b484b4f6
-
SHA256
440a57f326ce56a72418a6d1b6d2f4c8b59f2efdfe5eac67fc43dd24ecaf8eab
-
SHA512
02534e9ddd04100f10629b08278fed0490b69b03cc964134cee054946d48b5e6bc12fd403a7bb30187c7af9d952f9be5f3b30bbfd08933e3270dca9c380700b7
-
SSDEEP
1536:e60JFL5SwNiekgv6Q2hrFZuSuWtWWxlKq3qpc/6aJraEej+NGkKjpsxS6ZJsnefM:Z0JFL8wt67Kq3qpc/6aJraEej+NGkKjL
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133627379129352534" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe Token: SeShutdownPrivilege 4616 chrome.exe Token: SeCreatePagefilePrivilege 4616 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe 4616 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3960 4616 chrome.exe 82 PID 4616 wrote to memory of 3960 4616 chrome.exe 82 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 4180 4616 chrome.exe 83 PID 4616 wrote to memory of 3828 4616 chrome.exe 84 PID 4616 wrote to memory of 3828 4616 chrome.exe 84 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85 PID 4616 wrote to memory of 3892 4616 chrome.exe 85
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sample.js1⤵PID:1160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99037ab58,0x7ff99037ab68,0x7ff99037ab782⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:22⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:82⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4032 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:82⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4904 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:3188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4984 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4264 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3112 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4328 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4880 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5016 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3280 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3332 --field-trial-handle=1960,i,2140543580366855638,4528850568230775204,131072 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810B
MD5038344c1b3cd2eb2852fcad91cfd98e7
SHA1a8025bb1fc08dad7aabb9356a7a678b8a4c24c2b
SHA256ae880aee3d2407630e71e2ec5dccbe8f97a4fd7da39e886a4a041595fa1a830c
SHA512af0c3cc83ce74c3e794196e30c4b2a3bc21681b86f5596d64fea122a5c511b1c5b40ace0a0a56c1e1c54e470b52087d2a206ef696ce67af327570b5b798e677d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5e90778dee2cad38cc3fdbf789be9ed06
SHA1ea4182b3050d64c40a748c0813b4ea4543430e63
SHA2567d8c4921ebc7d5c17933a4b4be22c53e2caba278c7e19493299cfab00c5f6264
SHA512dcc7b7c5bcc5bb552a006a62f6786576eb7f8a750c8472366ed20b900a30b91624accff17cd88bd4736d477b918e40be166cb01edb0521d23700dbe658011465
-
Filesize
7KB
MD5030a527dd7ec43e86ee898a6f5b342ec
SHA124095d2f7fe27cf7122162c0e24308f71a8c6473
SHA2561d3d3ab529f679c8869e44462fa56cfa44451f742d2bb45a1ec4d0381e04bb1d
SHA5124e865d28a11f7fe331650aeecf20bbeae423f9a557b64f2179e00d2528d9fd7a42fa76772954e95690722221839d91b717dab548a055608a2af44e58def43b74
-
Filesize
257KB
MD57bfdb328ccb00b7e03f38c5a0213f497
SHA1347204bd13f3a21f8e248f6dd8bd845ea8c66999
SHA256cb3454b32a2760d6382c8e1c6ba577f87ff04e6b59bc03c99e2c7b418a47f444
SHA512d3491d2ccc7c04e97387ccb475c66eac4f046f0922945827909dcc9355c4d42bca1b5f644838c99fd6df6ed28c62e2622daf71371ebea87194c683547e963cf7
-
Filesize
257KB
MD5a3d5454c306929f2455166962dc49d78
SHA1e003101618bfc13a224e0b68be78c8804e9e52b9
SHA256701bf3c826cd5b010d999a2cde50376c74e472f06f4b15b401ac0025fb66c760
SHA51286a8778b17fd57b4347111dfab67f3d3783408798e0c5da5c566b1739c5fb1574526c9937f0bf6fb11cb06d81f7cacaa3e6a98044e3691ed07ed9007e51c0f44
-
Filesize
257KB
MD5e799fcdd8c981f2151ae5e727e9ae928
SHA12fff28a118f6fa5b595634cdd596d08db59649b7
SHA256aae7480fc8258ff30725c9c22c9ffca4a19f9d3abdf5e9133c1d88d9e885de5a
SHA5122b05deb4806f77bf3f4e3957039a6f94e3105949dc081e8d890a52ea7c1e4d376ddcf0fbd21ecb9166e3d3792308e54c1c01c6e761ebddf97db4889408e1f554
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58