Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 11:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ropzamks.cc
Resource
win10v2004-20240611-en
General
-
Target
https://ropzamks.cc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133643083906162942" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe Token: SeShutdownPrivilege 3780 chrome.exe Token: SeCreatePagefilePrivilege 3780 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe 3780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3776 3780 chrome.exe 84 PID 3780 wrote to memory of 3776 3780 chrome.exe 84 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 2964 3780 chrome.exe 85 PID 3780 wrote to memory of 3536 3780 chrome.exe 86 PID 3780 wrote to memory of 3536 3780 chrome.exe 86 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87 PID 3780 wrote to memory of 2092 3780 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ropzamks.cc1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad3f7ab58,0x7ffad3f7ab68,0x7ffad3f7ab782⤵PID:3776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:22⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:82⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2216 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4324 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4556 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4884 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5064 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4888 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4800 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:82⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5504 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:82⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5564 --field-trial-handle=1860,i,14889608396431269602,14279793718755478727,131072 /prefetch:12⤵PID:5728
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
936B
MD5dc305dd857a648f8a435ed527ac8cf35
SHA1f9bdb5f6c23c0350b76b5709555bd828749bbaa1
SHA256834d1ce5683d7b29a74ee9b830c163bf0565440132a9a79b8252a65001f4b79d
SHA5126a9ebd71e055395a2c878473ae2f58dd115df088a3088a44cf59eaf8229e19d36d2b167b497e75aec7e424c6ff7a378925200cf70d4b31d6717338ff4a319ca1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD5d8de5db66b1b0deddab8504ea0efe64b
SHA1b2a29525d0f2e702662712edbd66b71492cb5b18
SHA2563bdd193cf761ae4ebce8c9c8c51c9f79baab1eda22596f3527ec5115cacf8367
SHA5127a3924b61494c2ed1430b7723daf823c60279e2b04d60e63b072dc8019a376021dcb0c11f4cd64773a2dd481b1c10146a1de2d7e54400fe883c3af7a1de6ec37
-
Filesize
2KB
MD5d1cb1f46e7ba3b38347334a3dd46ab03
SHA1e2830db990798815af42e02057710863636a8e26
SHA256b47afeeaac545ac0402a67912d19b698fa09f4092e041f5ebf9ae6830466351c
SHA5129f8067e7b04f971c49e0d39a8f99d7f14de2e36eb46aff7bd18dcdf8d280b1b05cd3e62428d9c8a8b0a4b46070d012dea1c88cf619498e18c1a2a4b771ea9f5d
-
Filesize
2KB
MD5bbb105153900f2b055453a0e4ebd6a01
SHA1c27be5307db84c4c1385c36eb5a690396189058e
SHA256d343ee0c478e9234a7e7300552e3371828d6937eee3f0fe0156da76abf94ee65
SHA512cd202c9cc8237abb46e4993b0c183256e6c33de8c47f8465dbe0ac4c83534aa023881c79c6d660984edb49cefbeab626d98c8a5fe19fa5e688a56e65dcaab6d8
-
Filesize
6KB
MD54a6e6ab646e5b26195fba687a4186633
SHA13720e877cd6685d4522bd0f5f6d743f1339aa98c
SHA2561952dbe2ad10fee5d2718a34f88e6170aa6b69472ed2ca069246f1fa166d0924
SHA5124566b61a98a47c6043220d1e0dda1ac965c39850b3d405e58c59c77f8452bb32e4e1bbd55c3858394f242a449e2104edea09baa65818ff0dc56d5ad37abe1315
-
Filesize
7KB
MD5c3e04d3bbfd939d2768cd85f6440803c
SHA191dcc621c5ef88839d3e3d594a5339c3c9c063fd
SHA2565389a8964e5f626d15f66ced229414d2c5dc6d9f60f70a2b4cf9c9128f2e8ec7
SHA51267bbde93d5c75e5bee4ec06eb859e1eda7f3f911581824072c1a845e2422e6abd77292bfacfc0d0953545dc52a34501e58f2c84f3d8bcbebe74a6b7ee18e8f01
-
Filesize
7KB
MD5a82b19d5ce055f7914eade6d9adb8f4f
SHA14892bedf028b8892f2b41c9588010edcf038d568
SHA2560350d30e87c1940104db2611b5870a0af56cf0a245e9091f91ba452d054934cc
SHA5125f42bbf3674a272ae09cde74f86a7831fff3e716a3ecf6e294ebb6d3d79e858512e97820b62a7364ef6a86fec79a4815b88c78154d43c016338dcd99469742ee
-
Filesize
138KB
MD5f961dc4f2aa3827da6b64475d2c4b6cb
SHA194ac97dc38f03fd12a6c6db88af4053e05256420
SHA25654e129ffc3d6fb3fc4e53f8a297eb62da521bbc4d987fccd16ebfc521bcbe3cf
SHA51274e4133da48677e84f95f81f583be27fb3f6e5988adb548c81439f4a42960e266e090a45ffa4086d56f15912049abbedc6ed4c1820044c0158518b1525cbb4d6
-
Filesize
138KB
MD544164313a1791dc68e1adda3b51a267b
SHA1de1f75d0794b2530dcb2a39f9e73b931a8a3609c
SHA256417fff99a87b77b2048b389e3446c681d6d0579887fe0487fb452b296372c3e9
SHA5124ca263b0042f71eff8a092423242366bbb7876d2be96e088621c236e683c048f77ec029faacb7df92b60bc12d12023524c5753e8bf9fcdd2d34c9983d02d38c6