Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 13:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/FBllC8
Resource
win10v2004-20240802-en
General
-
Target
https://gofile.io/d/FBllC8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133725225436177834" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1484 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1484 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: 33 3648 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3648 AUDIODG.EXE Token: 33 1484 vlc.exe Token: SeIncBasePriorityPrivilege 1484 vlc.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe Token: SeShutdownPrivilege 3912 chrome.exe Token: SeCreatePagefilePrivilege 3912 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 3912 chrome.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe 1484 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 2752 3912 chrome.exe 83 PID 3912 wrote to memory of 2752 3912 chrome.exe 83 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 2544 3912 chrome.exe 84 PID 3912 wrote to memory of 3092 3912 chrome.exe 85 PID 3912 wrote to memory of 3092 3912 chrome.exe 85 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86 PID 3912 wrote to memory of 1532 3912 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/FBllC81⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93cf6cc40,0x7ff93cf6cc4c,0x7ff93cf6cc582⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1868,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1864 /prefetch:22⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2108,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2156 /prefetch:32⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2408 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4492 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4728,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4732,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4852 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4688,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4420 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4676,i,8109438167173871628,691388412196953747,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:4708
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\0hd21jkko2s95dc287tgy_source-0EPALfhN.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3752
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f8 0x4e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5c0290d18a239019845f8bd8269bfc50a
SHA1513eb73d3adeb2ddbbfeba7f9146f876325c64eb
SHA2562e9ebcf4673f951dd864424325294e272dd8ae68696dcf960791a6e894b94b24
SHA512e5867bd1820fab0a58d7f4123411733b2ae68a79dc29c86c38bd194dbb836b00f62e07cef825505daec022e74cb304cbd48fcba784a38c817f3eec96351d37b7
-
Filesize
336B
MD52fd47c255d1776d12632cf2accd0d44c
SHA1228cefb787665f9316ef9413a47d1ad95fc92b9a
SHA25646ed9e410182bb681bd64abc7d8d9fe31d0e4d9590f19386e0cccf1e6efeadb0
SHA512412717412a17866a96d9117f12d4f874029f4e71414c8cc61ed556027feeb083e59dfe0e36184487f326773df270c20274ac4830f510ef3da95aa5c2013ca558
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5420d9cc95acff7f8c531f2cc7fbd0ac6
SHA10d0c8a402f9232162de9d670490ef22709c167a0
SHA256fc409045356848348b5bb35f74d4305cdba4e7466e3c6faedcf394cd3e5b3e5d
SHA5124fa493e357577de21c7bac17345f7b6cc7b56ea8b87edbbb4376ece51ea83f716b6b6d9eae9518e0011bba6eb6f128d723dca1698d16b676b71dfca994bcccc9
-
Filesize
9KB
MD52e0e1f6a1e50db6495dd7ffb36e56e8e
SHA1441093ed14c902f99322c4bc89bb2ef81e986cc0
SHA256376a07eaf6a7d7fb407ef28c5f81b33575182e7d519622c870bf4d22fec1b9a2
SHA512cd69dabfbd0d1191a733e940c1895cacaf8315ce480760647aa11bea377f542bbc07bee6b7f5983ab45fd4820aeebb51794852e0878b1110c819f5aefaec26a1
-
Filesize
9KB
MD511ae4fb038167e3db1030be5d5957199
SHA1b6fc7a6c5ee39c3104e936a0612c0a27254b7289
SHA25687b036ff5647cd9f7d91559e148c4e4d252fe3b3e0d8a8b0c4efd86d95a94c21
SHA5122060ea0e8decd5814551799aeb045535573b54d8a340f12ef1f36d7bdc56d92a7e6682d95ddba997bfe655d5f46d7b3ce7b59ed23a0b3e2bb991216b5ffa399e
-
Filesize
99KB
MD5afdfb38d67cce038f862ce98eb19306c
SHA1ead04e13d07764de27dec81fc8198bb278963efb
SHA2569fb6d016635cd189e953ac30b4d8849d828f80067d107d036bbdf8f28991b39b
SHA512866fbb4afa0eb9c747197fa02b10f8ee1d3f9449ab1f29967275d774b2ca0739572885036328c2f05f4a03ffe3800a7e95edd1abfcbd72f4380d2059d10d9d79
-
Filesize
19.6MB
MD598977de3a2c484946cc6ca61f8e3843a
SHA1609fc899ae1351d2925d47852285a8f39a513f4b
SHA256e02bf97f2d9aae51de83f1b243d0f4c4e562bb908872582f29b7e77fc38f8ccb
SHA51265d46d5ea86f8b5f7c1c87c7e0ab9dc71444e2756387d3688414f8c210dac6b788365ff22bbd71b71d09c3e1622dbf0e30f9d8711678fa5a591ee522662ad02f