Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 06:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://assets.adobe.com/id/urn:aaid:sc:US:603a9915-78db-47c7-97f4-ca3d64d55656?view=published
Resource
win10v2004-20231023-en
General
-
Target
https://assets.adobe.com/id/urn:aaid:sc:US:603a9915-78db-47c7-97f4-ca3d64d55656?view=published
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 3268 msedge.exe 3268 msedge.exe 4364 identity_helper.exe 4364 identity_helper.exe 5428 msedge.exe 5428 msedge.exe 5428 msedge.exe 5428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 2168 3268 msedge.exe 39 PID 3268 wrote to memory of 2168 3268 msedge.exe 39 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 220 3268 msedge.exe 89 PID 3268 wrote to memory of 4752 3268 msedge.exe 88 PID 3268 wrote to memory of 4752 3268 msedge.exe 88 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90 PID 3268 wrote to memory of 3340 3268 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://assets.adobe.com/id/urn:aaid:sc:US:603a9915-78db-47c7-97f4-ca3d64d55656?view=published1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff32ad46f8,0x7fff32ad4708,0x7fff32ad47182⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,18371923860667420899,5643338339223938140,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD584df16093540d8d88a327b849dd35f8c
SHA1c6207d32a8e44863142213697984de5e238ce644
SHA256220f89151a0f978b8bbe338b937af90417ae8c17b72a53f2acea7be2ac171a8c
SHA5123077ccda8f86f47c41978d6cbb1dcad344e36f236251c8fd8c58d1c48a59106aecfdbe306357b7ebcfe3300bec8ea10ee0e59434c799e8c40e40e6c3c1bd4098
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5a0971a5c94a4de65ed61053234cb5956
SHA1bc059ebcb28249eaee6de0ccf62fef2698aaab09
SHA256de2b930bd34d269d34b1fa98694e16636c21cb4c0c5a4730f9c3d93d160a6b57
SHA512dc48e89b2680dfb845362fc55a75ca90bc1ec20b9aa07281c882c6dee745c1237238fe708aa3501972862e606a1101bea9cc8ccef14e1fb0ae3d3289cb2344b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize96B
MD574c4d9a2646e19efd3475807ae3a7565
SHA1a1d83a26634bae5237dc25840a0e6a74e037945c
SHA256d9ab17334a0dd9094a9be3d8fdac8ab65ac54a76380f8681e342ed41cc2d7678
SHA51246fe10804cdb05d5e7f54c0fe8320db7990a5b49766be2bc6d5d7fc9365b237f46d22b24e6c7b5e523f6cb0f57dd786e61b28aa0220e8247c89fcf47b1f42fe8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
969B
MD5fb347f6124f101149b943f334f8ef900
SHA1840f73e6eed593c75ff7aeb2ace430625def32f3
SHA256cad3656d2643271b54fb90296c119e23ba73a9eeb6765b33d72614385ff02724
SHA5128e71ed98948fc5223ae25b0ef8a3d5e6e83415cf846b6218117e96da521715b4a764d50cb9e106dc914348e23ba7dc8f02523869f7c222005aee9a9970f0dc68
-
Filesize
6KB
MD55a2bbe3083c677569bbf19d3b0a56d8a
SHA1c30013f044189e129ce23080d83c93af78cd75f4
SHA2563c00f05eab4d91c0c114a06ed0e63df515024627268d783d580feb759658aee3
SHA51206462646fd016b8ab47ca14c17e6e3a992d6485717c132653c53f85bb7d4e2f0aa2e00de2e09d45e4ec38a9194621f245c5671ceffe592a3bc4da34ad7435e43
-
Filesize
5KB
MD5ee1ed87a84245a0c664deff43635ce53
SHA1305c88c6b13142edadb3fb22bd0e85efa940abcb
SHA25664488d4ec4660d17670edd15e0299d0139ea44550473d073ffec1cbd52d5828b
SHA5129e9158e8f3f75244f97ca16c85113a882e0463dc41e8b26b2d3727d6c285f82b364c8363a63ad6666606b69457439af40066d46a7148804038b0e2fc1d0b1b00
-
Filesize
6KB
MD58c307ad7011f730ccfb1168de7f258e1
SHA1ee5afd257787eabd1b069b31d283c10759dce51e
SHA256e765281ce5b4ce2ad5fc5f69779260e2720042c4b5f6a6adeaebe94907405e54
SHA512e291a4d6e17646859e5a1cda315bccac76c0fcb346c937f1f9b9e52e14822d164767affdd075fcd3efc95a5be427085aaf155bc0a4b12038c4de8512881c1e58
-
Filesize
6KB
MD555a1957a76d0e8ca7a53ec441b82637a
SHA124554de523d95c29b7e80a3355cb523e2ae7a362
SHA256c2c1297cb08c72c23e7ec2f527d79e8c1121a66bedbc04b558d8d9d55f619b08
SHA5125df7c75e3b8bca1cdc1acdaa745bef017db84083ff47568634aac5e1e854245fd523f0e92ff0324d1367bf7ae1aec93c0a397522cc645e2e1d5743c527af72ef
-
Filesize
24KB
MD5918ecd7940dcab6b9f4b8bdd4d3772b2
SHA17c0c6962a6cd37d91c2ebf3ad542b3876dc466e4
SHA2563123072fba0ea8e8f960dd213659a0c96ce2b58683593b8ea84efac772b25175
SHA512c96044501a0a6a65140bc7710a81d29dac35fc6a6fd18fbb4fa5d584e9dc79a059e51cbe063ca496d72558e459ffa6c2913f3893f0a3c0f8002bbca1d1b98ea2
-
Filesize
2KB
MD58e556d8b17ecb77b0387573f71f5a277
SHA1c1467de081be4655118a515b5001379268f417c9
SHA256c6554dd8e948de247e30e114c4803762b5d27da7bab9a3a4d7a9c6dbf12f4156
SHA5122b922523050634b85e22545ecc6e194fa02cfedbcd681cc1ad5533166301ed38341bd0d9b7dc7526cad040fcd33a51bc452caa23af334db8d61f20d73259a4fd
-
Filesize
2KB
MD511de65f0dc0c642a8c758e4cb83e2146
SHA1941d70b3704ff3b3609b6e0f0e2c801c574a8073
SHA256156f262c5d38cb2620f661b37f3bed9c9d60b7a95788a7ee5883cb89f58f7f94
SHA5125a6adbd9bfca5be0f5918da317ff3fa7d7775e0a5f684cf5e32bbebf9918368ee49deeb6e34f71199f56490f59cc3e25f339d2f83749c2911518be97fe8329a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56c3a66c37d51853dc44c577b70d75d3d
SHA17c86cbc6ebda724b3d8f312c8f308f1311862b29
SHA25601118665782f9e5b98be6e2fa4a60be25c95691a27cb55b4b30c383b3d8c29af
SHA51221e160d955b310d1bd48885b63dd7aeae70e289faee1600a5d0b103247e0d02c0c3de6cb7ec79b6240b90d7f57db1d34011915581a44e9588aad0f3301a2cc51