Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 16:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1270531201375014952/1270658809655853077/SG9uZXlwb3Q.exe?ex=66b480bb&is=66b32f3b&hm=179e2cdab542d4bd8031c1c620dde0a1a2500cef326190bc13e4afa07eaa038d&
Resource
win10v2004-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1270531201375014952/1270658809655853077/SG9uZXlwb3Q.exe?ex=66b480bb&is=66b32f3b&hm=179e2cdab542d4bd8031c1c620dde0a1a2500cef326190bc13e4afa07eaa038d&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4684 SG9uZXlwb3Q.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 404876.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 1744 msedge.exe 1744 msedge.exe 2336 identity_helper.exe 2336 identity_helper.exe 1440 msedge.exe 1440 msedge.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe 4684 SG9uZXlwb3Q.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe 1744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1388 1744 msedge.exe 84 PID 1744 wrote to memory of 1388 1744 msedge.exe 84 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2624 1744 msedge.exe 85 PID 1744 wrote to memory of 2576 1744 msedge.exe 86 PID 1744 wrote to memory of 2576 1744 msedge.exe 86 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87 PID 1744 wrote to memory of 3540 1744 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1270531201375014952/1270658809655853077/SG9uZXlwb3Q.exe?ex=66b480bb&is=66b32f3b&hm=179e2cdab542d4bd8031c1c620dde0a1a2500cef326190bc13e4afa07eaa038d&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa591d46f8,0x7ffa591d4708,0x7ffa591d47182⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Users\Admin\Downloads\SG9uZXlwb3Q.exe"C:\Users\Admin\Downloads\SG9uZXlwb3Q.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12164976288604844783,16106549395527884232,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:3200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5836029e00c22dd62c2e729c2ef59d3ac
SHA16181c015a163108ef1ed6cc669f7f3c5d6db7364
SHA256ce1ce2930cefe9ec89a9a257e2d702a93c7b684b4b6d1afb2bf1437185b73643
SHA512f6d11df9fc5580a4f63a48592a5718072a537f99c5c462777b1b2b8ec53731e898c9e7c3bf54c866979fd7c726c72e71ae8e97501248712a54176333006cea89
-
Filesize
6KB
MD50c3629bd9f9dcb17e176b3a887c9c040
SHA1691fb61ee7eae8b8d7273e18dbaac93c5c354f17
SHA25639d7847af27f621207fe477e3a53db496c1578b51533ac3f1ad97b1a004fcd6f
SHA51261ef42bf93adce387273b4dd2f86fef5f35e2873382642f5c435903a36f5703dd0ba014427d4847d53cf35df3cb9e2719a7fbad34126bc413f734137eee6eb8e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52169ad644055bbd2ba46826c935c08c8
SHA1e0ab6790c7e9b2081702d1aae71fe92f2750d51d
SHA25648d4e55cd44d30c9158ca830a84ac893c9b3dc6851a55e82b6c9c6be25822082
SHA5122e846a64e87b2ecdafe86f299834f7bdeb31a2c920c2c7957634afeee0d4c9645a9b3b2709c46be69176d035e8e13aba7926c6e5542d27eacd0965efd4d3387a
-
Filesize
1.9MB
MD5840a437a3f0fd4ffc7e640fd50112fb3
SHA1b8df93d4ad036fdd203d55c56c2224ca4a53c187
SHA2560e3ddc4add4de93951bc64ac614f5e616d46a9d23d9d9aa56aa27b0e31c073b6
SHA51201d5c6a41c4f1c7880e6552afa865dc60fe8873b579f2e84146fe22dbeb1d2ab6550d02cb014c5a8b45f22f3370a4d76f4bf60aee16866f642c6cdcba965fd72