Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 03:21
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://cyroyte.com/&data=05|02|[email protected]|58ba613454e84c2c0b8008dca1487d63|5d3e2773e07f4432a6301a0f68a28a05|0|0|638562579918301884|Unknown|TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=|20000|||&sdata=vSCC3UVFBk5ax8Ay01sGbWioVHUlMYr52C3x7OmGQHc=&reserved=0
Resource
win10v2004-20240709-en
General
-
Target
http://cyroyte.com/&data=05|02|[email protected]|58ba613454e84c2c0b8008dca1487d63|5d3e2773e07f4432a6301a0f68a28a05|0|0|638562579918301884|Unknown|TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=|20000|||&sdata=vSCC3UVFBk5ax8Ay01sGbWioVHUlMYr52C3x7OmGQHc=&reserved=0
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133652281043246638" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe 1332 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1364 2096 chrome.exe 83 PID 2096 wrote to memory of 1364 2096 chrome.exe 83 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 2124 2096 chrome.exe 84 PID 2096 wrote to memory of 1028 2096 chrome.exe 85 PID 2096 wrote to memory of 1028 2096 chrome.exe 85 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86 PID 2096 wrote to memory of 2360 2096 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://cyroyte.com/&data=05|02|[email protected]|58ba613454e84c2c0b8008dca1487d63|5d3e2773e07f4432a6301a0f68a28a05|0|0|638562579918301884|Unknown|TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=|20000|||&sdata=vSCC3UVFBk5ax8Ay01sGbWioVHUlMYr52C3x7OmGQHc=&reserved=01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffef8c6cc40,0x7ffef8c6cc4c,0x7ffef8c6cc582⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2420 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=2268,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3384,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4396 /prefetch:82⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=728,i,10147449289216725757,17593737284980782592,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4788 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:1380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\86fef8ed-4bcd-4eea-9a7d-22816c24ac0d.tmp
Filesize8KB
MD5aaf2838aff220eb0c4ef3ede486af22c
SHA16bcd43c825767d0a6fd1f3c1af463795ab936fea
SHA25690cf41b48451959b262b5a59277f85e6ee9fbe8cbf20b675a91ec7f38ebfd709
SHA5120d5069cb117847504b8db99bf4164b45556a63aeb1f2c97937b32301794d60ed7187ecc360b202c551c6465e31ab8d620608a827383de50b40eb65656fc64e60
-
Filesize
1KB
MD5973677e97de5b661e07e2f861e80df1c
SHA138104bc109dfd9acccd8fb830c17a5bb46b7d483
SHA2560d5c1e7715f3854a415424d0060bc7756ec8bd1c72d9f4e5c21acf873279174d
SHA5121abc98e965e7643cd3baeb4bfdc5d45e5211041b5d1e846d2f91291c9c3dba129f958b2a8ac0b4d7a53f6bd32ed83debc98c3a8e69679a8e2a5a0b1284176b67
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5ea5044bf30f53c61b1571d07981509b5
SHA1005f157c10bd655d19446e4ced76217ca5be0fe3
SHA2562cf18d22264ac12ee45492216dd73486cfd38daf90f9c49652d54e7df1e613bd
SHA512554c6b601785cd3f2e4264903793ead764fffe992d0ec1eac811a684e30a3eb3c3dbea2b514315a782a97135a771520f6530d0cf3d1f5ed0ab562a90bb98b06d
-
Filesize
8KB
MD5875174424be705e6b5495f8c321b504b
SHA1a28094d92896fced90e8e17ce55534879a223966
SHA25605c31fbf45d21843afe856f660f877eeeca5812916d698cee23034482545a967
SHA5122606e83dcdc9b533f23b729346b4c9b8e801e185d889d6b7d619b83b5f17dad963f21295fe927e2ffa7ebe7858c00a5ab21c1e8c8dda9cd8cebc2e26e00d4a48
-
Filesize
9KB
MD5fd8377d2eb94208d4647efa0aa2eaaa5
SHA1da91f4f04aea821e7782f58c1c71172f2d0a1e26
SHA256ab3e4b7515604957902a7e0b342691ef209ab681a0d077df52c087925ff6a261
SHA5120ec3aae28df524c77bbdf50feb5243d9a5220cd467fb9d07586d7d0f30cc05af8243c0f902c0f501ec1456787a06fd71fd709987923636732e126aea103c403a
-
Filesize
9KB
MD5e1f49af79404e425b8b27957c03639b0
SHA12e476090018bb0140efe8f289a6de1fcd5977f30
SHA256b1b0dc31c336c53f3a93eb7c6121c2bf59d9e7f7781b601ceb9506d26296c295
SHA512b230b5406ed786b8d1d41b484df86a45d471eafaf60ba6a00f997a6ade3aa29ccb473eb525349b46ea7953f0a27a4c566d0673a72553b31e5709bfdf0de47286
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a3957b04-11f0-4198-b512-dda40f020642.tmp
Filesize8KB
MD508bb6be8ce33747cba24abb0dcae959f
SHA196601003a877a5119c2d227a415a324397bbd2d2
SHA2561ed5acb057166bdb6dc8342d3313b8b27e937f6c0efa6ae2430dad5dfc10b773
SHA5121b6c6f92067d798f7b53bf66d79b6340a7b1508774ebd5c286c71c36430a24de3e2da68d7120e95ae62b20fbe1e223549dd1aa416ab64f620aed7eea5de7cf10
-
Filesize
92KB
MD565e3d09e1e3b7ed42d4ac1d112fc5f27
SHA1d93dc2445d52f49736ed9f41461c4b2880a8b09c
SHA256ab522e79b785e23d7078aad46da801f90552779bf315dc7d7d85b8cf46d11e1d
SHA512e7de244a6bbf952f29a75fcbaf73ee88e1506f32452e4e690c3f0a11d44ea5809bf8227ccff5b8ab3ded17694ecf666739adfd527da68f15fcaefe10b282eacc
-
Filesize
92KB
MD52dc7c7ddc227ba968bef437d626e2bb5
SHA14900a592c04cf0b28f374824743c826b4ad308a5
SHA256c06e39573c3689a24ea3912ea31858528cb2429d3ef11e4460bb71580664cb36
SHA5126c422f0c9d1e813d38bddb43044cce46c417bd2b4e5b84d2ad2261b51f6da67a06f86ecb1f934148b390af5e71c4a641cb4b96ad07f9811ef820e9a9e73ac4e2