Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/06/2024, 04:37
240629-e83fya1crc 3Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
LoaderC.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
LoaderC.exe
Resource
win10v2004-20240508-en
General
-
Target
LoaderC.exe
-
Size
24.8MB
-
MD5
167ad54828fff3b030106f1eba3a9a6b
-
SHA1
e7fec5ae2975a981b5686ebd951322a148eb2cc9
-
SHA256
238ae034d69064f92903a8a10c3d4cf0c2b8a2179439d6c314b381bb8b4e6770
-
SHA512
44e2ba7e5cc546d147ad04b91ec6583bb073412d28819534830a58a2e94d5bf8928c613cf7d90ae68c2c71388774425c757ff44f9d5b54acfaff6c4e5a6c68f0
-
SSDEEP
393216:HdXrv383b374H96bbcMQdn/CMOr4St7IKYHB5xxmmbDX:9Xrfab3EH9iJEni0WXaxx5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133641094803949176" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 380 chrome.exe 380 chrome.exe 1880 chrome.exe 1880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe Token: SeShutdownPrivilege 380 chrome.exe Token: SeCreatePagefilePrivilege 380 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe 380 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 380 wrote to memory of 4128 380 chrome.exe 99 PID 380 wrote to memory of 4128 380 chrome.exe 99 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 2044 380 chrome.exe 100 PID 380 wrote to memory of 880 380 chrome.exe 101 PID 380 wrote to memory of 880 380 chrome.exe 101 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102 PID 380 wrote to memory of 2160 380 chrome.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\LoaderC.exe"C:\Users\Admin\AppData\Local\Temp\LoaderC.exe"1⤵PID:1800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3760,i,15140928051103392835,1612840580898364401,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:81⤵PID:4828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffcad52ab58,0x7ffcad52ab68,0x7ffcad52ab782⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:22⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2260 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3104 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3112 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:12⤵PID:4036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3644 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4644 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2276 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 --field-trial-handle=1936,i,16620454797893444063,14788962161993476871,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD50dc15436a18077494989debd19d238e7
SHA19f6d76216a3b2a3b9dc5953c5525f2651673a77f
SHA25624bbcc31222ad33cbc6cc10a4fbc480c6e433993a553b3bd82775cbd2aba78a8
SHA51291788678b02318d3cac212f598e8ae16bb424ab3c2629e31a039c6cc7b31c5db35d9ef315406c1c99cc016e84d8d3d3a83003d14910a135ba2a340a9bcd016ca
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\39519881-658a-4eaa-b33b-00dec2cfbdc3.tmp
Filesize524B
MD5e27addbc579bdad46ab19dcbc5de761f
SHA1517d043988265db3527f68385ec23fef1e8ca9d9
SHA25683ac81ee6e21c822737d158f10fc4a49b38de82d777d5c62ae6fbad01f176406
SHA5129b1a819054dfbb6b0fcb7ef12a638c8a2e3a2aef5027ccb2e5d586d7d65473b1f06622a591e9317f2077c9a13272de1f5d107d09deeb0fa2d2a82e429b4e4409
-
Filesize
1KB
MD547052bed5a83ea0a481c6d933224a491
SHA1250881df5fe3273420b57631a3d2073b5f4b3612
SHA25691e8c7d6075fe7535889a2217cd7412def8c2511c3aa50378c797b9664cee8b1
SHA51233c88e9757b2128b42a6da906bf7d1737eb3c878d130b7cbb9374162dbeb151e783f3c37fbf26960b0604a62cf4c3bb843a80e751ca5d0b074ba00b12207d783
-
Filesize
2KB
MD5710d84fe7a77edcf2646dcaeb5253332
SHA11786a67f976bef14da87acc0c1f8c143729467df
SHA2560da0604e3c8f1f85109131e084841b67e9325d8a59fa315139a293765c28724c
SHA512f144907d697f65941aa6cbfd4bd89087e65916ba10bc66a71c8808cbf3489c2c4468c1ef32552b421f23470a28d61db24b2fe7f29b930be843490cc9ff7ce26a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD562a450c2c50087743644670caa9ebf50
SHA14d613707d219ba6dbdf031c9d022b0bceba41596
SHA256b6628a05d4745abd78be5f92613d4d0d4e87ce55af87e6dbab7f00b329a958fb
SHA51250290dcf6f4e99af2f2de690018059d6fcc1bbc2f4a28204b4d7a3e2e913e7779f016ded147ac590e885a33dc8312dded69f832e9186630d28478db06b975fa8
-
Filesize
7KB
MD534f30e0f4c175da58be3e16df7968c3a
SHA164f43956448b9348da626f5232e2bfa26a55cfa7
SHA256fba3329c0a46d32eef887a3c9155fe4c1adb0d204dd0fdbc01d2677a203bfe96
SHA5127840662ccd3f89969a2b57a85800f54cdfbe45f52096131fd9f35afbc386cdbfb8387efab3ae526197fee2a67fbb6a02e7d6f6cbcdebf1bf5decdc783c49c190
-
Filesize
16KB
MD5893de7d9566a2233210a4cf9c1c6bcbb
SHA1bc2bd877be367384bd93f2271d20cd992d5fc0d8
SHA256ee8b9b76c01c7b88a8d1b5a632c7ece3061cc5de8c9feb6c5cb95b660a53ea7b
SHA512afc916e47d850eca056c84d7a6c65baa68a67e06aa0411938991f38bcdacedd9defd2722a4adadf7541b8e7dbbbae8ecbd402dd4ed858d1b28171a14d9cb6175
-
Filesize
272KB
MD53adf4d3d95fc7aa1bcec1affbfec8e38
SHA13cd512fdcb9fc551d101b3f7d29a20abc717f76a
SHA256cb43d2c41a4428f2ebf7d8939530b37234cd8240b53e95309db6f027f200ca08
SHA5120e6ffc0bf5863407bfdd11371cd681b78d6294b690224598e5eb23027896275411cbcf898851803924ac4c34e11ab2d1db30ffebfe30e3af56080a6585ec5af5