Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
77s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 11:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/l/scl/AABhrH28m2wd-X0TOPZ0R8-Frk_Ny82H7tU
Resource
win10v2004-20240704-en
General
-
Target
https://www.dropbox.com/l/scl/AABhrH28m2wd-X0TOPZ0R8-Frk_Ny82H7tU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133649111761459123" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-771719357-2485960699-3367710044-1000\{73559664-A460-4A86-9F13-6CD8E9ABB572} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe Token: SeShutdownPrivilege 4304 chrome.exe Token: SeCreatePagefilePrivilege 4304 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe 4304 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 4832 4304 chrome.exe 82 PID 4304 wrote to memory of 4832 4304 chrome.exe 82 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 1040 4304 chrome.exe 84 PID 4304 wrote to memory of 2076 4304 chrome.exe 85 PID 4304 wrote to memory of 2076 4304 chrome.exe 85 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86 PID 4304 wrote to memory of 4444 4304 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.dropbox.com/l/scl/AABhrH28m2wd-X0TOPZ0R8-Frk_Ny82H7tU1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa908dab58,0x7ffa908dab68,0x7ffa908dab782⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:22⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1936 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:82⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1860 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:82⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3064 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3084 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:12⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:12⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3068 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4432 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:82⤵PID:732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4420 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:82⤵
- Modifies registry class
PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4964 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 --field-trial-handle=2004,i,18291130029578932040,3458741634028531963,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57fbb8e91c5f90bdf1e9d5021b87372d4
SHA1da0e7d62db4d7393ef6e624e3727d774c9856076
SHA256da29aaaae4e0f22cf72f94d3f6e0084f7a1ae45ad019ef453a184fdd8e5e6df6
SHA512a18abe7f7aa34b196ab04645c4be5fbe033e465988efc65039ce8f0c9a15e62454f9613987b969a7446750b122471c2c52d0cf0bf883dfa03e026a401b5ac5c1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD5faf3f35fd2e38b57e601bafc88b546e9
SHA1ff830da15708d98d93b3fc9c4c6892b68eb8eaab
SHA2564b627611cab77874d1f7ef826ed674e5fa039aac11ff2f0b89a0d12adb545042
SHA51201711d3b3c0113a82a74ab50a7aacadbcc701886f3bbb5564b8cfde68fc0d476df28f9b08fa73974651b947489dd14d32850f3826105c569e3ae491aa3e4f843
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD51fc6a9fa66619abf6fccffdcfb3b752a
SHA12142dc355b35f23bed8569921b1ec67da16fd263
SHA2569b4a083e32660530818b3b046a60f40005e10583456f9df030c2e1a3b25db5b1
SHA5129c22ccf13558ab96dce09dad82136877c42357d4113a273f577c4fdecb5349f3c5c8c3adf912a11d51ff2e4abc40a15bbbded045d02414964b54f50ea72e347b
-
Filesize
691B
MD57363785631162c12c0d2643a41369585
SHA1a39008cd1c0ee5b88fcb900d4126ac5172526fc0
SHA256e4f41b9a5e733a9840f06822f7f5e451eb27a897fded8978a403f66b1b0dd675
SHA5122b76e09b3cb035dc01b5fa0a243ec844c84f99efbb40e01541106d44d542d9e70f4ed4a47814ec167d1f14d4baf02793658e050179ec0af3c661ab6928679c68
-
Filesize
691B
MD57f618046a2b427b108cd6bc12e0bf00e
SHA16ff5e01e68d4188ccb6455d9afca1c47dfefe5bf
SHA2567b113b00c3ff63c3188f9bf19cb6ea2b68b85160e9d6ca60fe489c1bfd4b84a1
SHA5128f1274569945543eaaa2645036a096d91d2f65480a4a9cbbe0a92636cac93e7a56cc21904ac8c47f997c5fdbf3748c113c44bf80a85f97353a099182f7234617
-
Filesize
691B
MD58bbb9669a507e8e4eac6623f980f4002
SHA1b244036df2977fadc8e2a112e7e03ea08fb68445
SHA25650fbb8f440a40e50f8d503717490524c2522a50f402246edab5661bbc3a716d3
SHA5126dcfdcff37d05ef18f9b9babb44bf9a3227525413d309f6cf99d469f354a9668cca1d30c7bb2c7d498abc4c871a360ece0ac9ec2de1f8b5c8f070723da890545
-
Filesize
691B
MD5a943b667d1451d62cca670c2a5a0affb
SHA1440084fc6ac1fd8afc5aca83896ead2cf159d945
SHA256b058a233f801b13886642de2979a0021bf3b260085aa5e68ed1c8371662c00c6
SHA5120262eb0c6e40634dccf594f446f23ccbba25015ace261e7f92fc92b2dbdc653e0d04535dfa5fe4eb911db560853bf0aa26ba6d5235bd3b31938648cdd933801c
-
Filesize
691B
MD5ed4b01c245421373a090ef64d5a8e9c6
SHA1eb695ac4614b2fd298970776733169323aa8c848
SHA256eaaec843af000580060d035d07f858c549ebfc56d6e6817c1aaaf786d0918a0b
SHA51209952a69d52385b1cce8cb686851a1b8d815ba1b16a5e3ccf7a7e22db54e359c0aa9a04720345aae202fcbb59cbcbcbfaa791a9e2e3dbe929649cded27656602
-
Filesize
7KB
MD5367e6f7eb785a5293dcaad8188ecd8ee
SHA1ada597e6092a972e2a64169c0c894ee3eeec7354
SHA256b8121c05a16e7cb32ddd682a019998fdb1790147037fa76441b3fb1da8884176
SHA5129103a79bf9915d62098565bd345a9a353385e1f347bcac8df17ee0e87be04f3503d86482672d8539db59174a37b9154fb4aaef51a07b081c19655bb27f94f710
-
Filesize
144KB
MD54b9be4f4d0e28e825c57e075943cf1b1
SHA1fa636d92130327775358fdd7bba1ef5ac5941f46
SHA2564216f64488f229a25857514aabe51bc714cfeca4a81c3cb7f4a1b461fd8faa7e
SHA5129b282b1b603788004438db6670eca2647a6e463766f100a62a1b120c13d4afccd3f28cfcb9df7330eb3eb44193552662649cfb039b528c9a6be4d5b7fc859647