Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 01:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.logosc.cn/img/emailSign/icon/email.png
Resource
win10v2004-20241007-en
General
-
Target
https://www.logosc.cn/img/emailSign/icon/email.png
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133734288442732849" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe 4584 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe Token: SeShutdownPrivilege 2408 chrome.exe Token: SeCreatePagefilePrivilege 2408 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe 2408 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1612 2408 chrome.exe 84 PID 2408 wrote to memory of 1612 2408 chrome.exe 84 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 2636 2408 chrome.exe 85 PID 2408 wrote to memory of 5052 2408 chrome.exe 86 PID 2408 wrote to memory of 5052 2408 chrome.exe 86 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87 PID 2408 wrote to memory of 988 2408 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.logosc.cn/img/emailSign/icon/email.png1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe5a7ccc40,0x7ffe5a7ccc4c,0x7ffe5a7ccc582⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2144 /prefetch:32⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4376,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=728,i,5151156632046190554,14740720752017699892,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cb5bc07c8458fae2f345c7146f7b55ba
SHA10ba38cae4d2d12cfdf92bdb982aa8d1bb2146f5d
SHA256d004773f626ff96a3375c833a972c394dd94cc1528a3f60fdc605cd29b73aa5b
SHA51236ba295f5427f3c5cead51c2b008030792513cfd6beb660c64cf5c15a423a52073a4b17f1c50557856be4ddab28e33f7eac324d025f382180b67074137d5911a
-
Filesize
2KB
MD538918ba9808aaebbe4dfdfe1dc3bf289
SHA1cf6025919f435b88519e8bd1844e2f9e2ebeabe2
SHA256d73c28815dae2b8988045a622b34f75b7a7be5e2edd709a64f1e7b6c5e368df0
SHA512deb9e7d52096c96bc87e4127a84fea0a0805683febedbf7af529e28c2f19581c7ae581617f1e3214271e7dcfc6085252b3cbeb01138747da31b6ee0c78e1007a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD576c528bd3c485e8c1d43d377d473adf0
SHA1498426888c5dadb2e2b13793883d2720175d801a
SHA256ffe7fa4f3ad180e4b8475a43d4eaa9c2e3f9fddcaf1d5e14bb2b57c55c06985c
SHA5127f2fb4d4425267a36f3086b5ad95748c797575b08780c85dc3e56135819d4fbb5f0c9fa29c1710a3f74b8bf790cc0c3f2a4b1ae069f0edf153bdba4a199636bc
-
Filesize
9KB
MD57299f7eb66bc99f3e167dbbc6a3b887f
SHA13ff06fddccb4d583e23eb20e48dfb7fbf23ee7c3
SHA2565a399b1b55f1a7dc2609172aa47ad93e39abe9fd5c93e7af8b4be64fe26b7b7d
SHA5126ece03c357ac029032b4f97d495f9d674a268f71d4490e886435cf901930cd1c8bafe97a064140a8836b448d632644a79fdd7f2bdf9b9d632f9fbd20f91bb813
-
Filesize
9KB
MD5cb4b6683b547fe5c486c8d41f13e9342
SHA1f2214a3fe5970743f0a8223d759b31124d3e0dcd
SHA25639a0693312bf1824ab02c2020b8bcc6e268dbaffd195a7841592fa7fd7f626b1
SHA51286a8ef0b8d47b7fd265addf3c4c9acdcf88edda2d57a2b0e1d60f85d8ab64a67c0b2e9b819cfeccbda9eb28b3da745f4af64ac2394059bbbc6223507b15587d5
-
Filesize
9KB
MD53c50b0b36dcc3dba0af4d205836b4f89
SHA1f721ff370135ea2f21a3e10e691e3a4e8888eade
SHA256a19c923989a8a12b141a69dddf8cac4766f66def6a42166655eda5bab837533c
SHA5123f82451779e7b4783e3fc05bf4fae54e96e10d18440bcd92c8880ddb2ff784d3ff2f2a4b3da1221c84e8c7ed43bb1c618ab4ffc1c84f4bd9ef1673284b6d04f6
-
Filesize
9KB
MD524b9ead14f2e513b06f3dc52e5b6ec5c
SHA18a09600995d21ce6f7103b36c81c6d2e91a4d6f2
SHA2565b5b6b0495e394e57d873f22d5bdb47d22f1295febd584d7fe624d65b8937a9d
SHA512c76b05878976b530bccc462c8f3f1adb621d9808920615ed21b7502c543629849c54e42a3faee1ad385058e69971207eb49cf24f825131a3fb4d6b437c5d1fe7
-
Filesize
9KB
MD5237ef684ae434110242a03d35ea4d85e
SHA1e3671b7e93952591954a58121de7d5d0b2f840c5
SHA2569b35fab4d56698e11097d79d45852b7a6b56dfc756e4ff685415128a724793c3
SHA512e72e23825d944e8d2ce73986767a44946ebca1cb11a1f9363e9426309813b72f2dd7c0fe0d6d33120a4bc747473eda01c2f14558948843180097627e4d5a0749
-
Filesize
9KB
MD5404dd21fdecd031da252af82f0303530
SHA132f40bc6a371ee839af5e7fd8455b739dbc36300
SHA25684849eefe90308517f4d42c0238f271cb677e82e8322d9bc06cd2126113b6ef4
SHA512ba445eeff566bda731e375f5664222fd926376fd0d7051e9e971c359d63ccf1ba31924a2ebe5b2b7305109dda12b06f0752ec08d13d4ea4d8e35338309627ab2
-
Filesize
9KB
MD5dae4698cf6b6ff963ebe9192466b6f52
SHA146e93ea931569a2c1ae270ba78a541a762c9dcfb
SHA25691bdce92a061b35745b20e60c77fec35894daa10ca7d7160031f40a2632ef988
SHA512228fde7174f65ec96b862e121bc3a2ab23cb74dc863f34bd055764122ccf5e661937dc41eecbaad5faa8ffa1f2e0b932969e67b29546d257f5bd9496880704ab
-
Filesize
9KB
MD5985fcc92729bdf67abc0efe690377d68
SHA187bb65ba0adf87b433bf2ce322050a1f54986a42
SHA2562af7a0f9a59dc78d69c1b29d157f12458d3b5f8de3d8b5ef657ed155e534b509
SHA5126456338dde37c8c1b957615734b30a781a6f09723592f07ce32c545747e8340de23ac0420c01d0c29bd02b127794b72b385e7e67dc0d5364ba2fd65b309e32d0
-
Filesize
8KB
MD57d69c6fd49dda42dc286dc0539a469b0
SHA10dbe43ce76a642d176242f2036743693bdc7cc46
SHA256df4763d9b61c640d35cf6f41bfd618c553763324a932b45cb6a0db5139c5c225
SHA512056dfe4741b0908c5ac75ecbe697b9f8aa78970ac6de91ee519561b72912db277c357def0ceec9997e191b23eb03e5e7ec614e31557231f2610bfae201472905
-
Filesize
116KB
MD568a1e5c808ce56afa751468e9b64cb3f
SHA14eb1c46b4077c1c5e3e4c41fc7e22859d0a4c731
SHA256c324cd177a775ea9ac2b229c6f06eb1983e71405d9405e0cd1fae9af0815d997
SHA512613e29d167f76a66100dd7734d8cb865bd8168c659d3f4899c5742e3d80a878c5a0c5b4524bba6582f2e7f1d0ecd07b76ffa6b22c9b5bc4603b1f89a17227998
-
Filesize
116KB
MD54efe2ddad270b51083b6ad481f25cc8d
SHA17f3cc2075ee4b60057c5ded898a2f924754a98f8
SHA25603eb6a9a54ae3febd4841518b8d679ea13ee9af9b868d2f2ca07a678e27512cb
SHA5127f7959ff432e2e8ef05b56be4e495d889143c6e86e9a5a89757f49337e4b7c06348c600e293daba53fd01c44625f08f143872fd3d27bb938b07527da87485918