Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
999936fa6ff772bdfd5f9da75d01618c.html
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
999936fa6ff772bdfd5f9da75d01618c.html
Resource
win10v2004-20231222-en
General
-
Target
999936fa6ff772bdfd5f9da75d01618c.html
-
Size
24KB
-
MD5
999936fa6ff772bdfd5f9da75d01618c
-
SHA1
624f28b7286c47980d36c0620cef0cb344ad1139
-
SHA256
e9af1cb3c1a88f1f7da8085c65ba5f2b2642b8201a9021ce85de62bc4407da77
-
SHA512
3c3af75582757a1dd649823fb2554459a56d0f245447cc7991fe2d2e1750d4ba834fe6db3d46741fc6bb98dd49c418f2226d5e3b3cf2b742f8ea8deee2da46da
-
SSDEEP
384:Mu6pKJo0lNW3giKXuPIhEcITHTcNEDdQMhOWI8L:dlPdZhdibFhvL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1292 msedge.exe 1292 msedge.exe 3156 msedge.exe 3156 msedge.exe 1620 identity_helper.exe 1620 identity_helper.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe 1524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 1808 3156 msedge.exe 77 PID 3156 wrote to memory of 1808 3156 msedge.exe 77 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 4244 3156 msedge.exe 86 PID 3156 wrote to memory of 1292 3156 msedge.exe 85 PID 3156 wrote to memory of 1292 3156 msedge.exe 85 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87 PID 3156 wrote to memory of 4756 3156 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3fb46f8,0x7ffba3fb4708,0x7ffba3fb47181⤵PID:1808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\999936fa6ff772bdfd5f9da75d01618c.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3020 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,15961180277896414929,18157306666619642734,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD59abfb3736e331185e2bc173fe2fcc1bf
SHA1f1637b2ee8ff5a91b2a35383c224f034d3bd3ab9
SHA256b1981552a5bf8de01ac4e8a1e8c75460cdc992a66b4310e81b846674c4caa698
SHA512b2bc7593797b47b2e57d784cd29350e58ed4d00562739b7c50932ff64fc5b41b0cf5d84ead7660788087f6f2d6fea92e2bc6bdef75a1985a51d8d3ff573973d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e3843ab19f1cd4061c9396449be6f787
SHA1c8e112f8a787b9df55c1b38a86d8d45d51abcc98
SHA2561cb15dd5a798070ab2e364023145f0867d500a5d3a4a79dd9554db092894b51e
SHA5121196b38de0b6106ce3b30984f294765e891804a398661dd6a63a2ac97d6d26bd32fba51b6946b45e4fe0dc6ff7e85ba1da33eab015c08ca4babc257f6f086169
-
Filesize
646B
MD50a3d4c9f8836899700a233c9e186ec9b
SHA1307690053b3f07c542444b6e82e58f0caa9899a7
SHA2564571aa076fee0e14b7d8de3ad673d11a3c29d08ff07c3be3faf893a7eeeb4d69
SHA512f421b32a54ea2464b067ebfa86e59bae0df93442c53a7e6b31c3a90b5e5bf4603edea8969346beef87e579a9498264b04cf72fb648e194bc1716d8325395346b
-
Filesize
646B
MD557950d3dce38082d05769a8ffb59daac
SHA11d0cfe8f4b429d6ce7925b7175321431f9af2054
SHA25674c8411f74a75c09fa69d5129c66b5352419b80d37bd96f69ebc797dc2408edd
SHA512bfefbac3b9082623f6608c7f818400d93f085430360cd06774eca64c04e0e87d8904c651998294af0447d8bd7ad7c0b3e8ec6198d5e377cc96532acf6318c3e4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD50a04a333628d6bcff6694eba148a6278
SHA1a600b90d09eaf63d4ab772d767ba7bb61984efb8
SHA256890da14bdbf3efc2cee02c3b85e48fe0ef4fe91c924617092f4a2df5b8952829
SHA512033b3805968403b3704c90ad3ffde23382e6a0e7c9e5d518598d503e8603b375bd1705befad3fde8277cedcec59ed6431557f3be09e649c5ec8d3a45e9d6cb44
-
Filesize
5KB
MD53219ff87a5a6b72fe8ede53f74bcf039
SHA10f16eebe331759dc6906ce9816486f78f2e46a5e
SHA25658fad4ee56ff752b4184f82e75549c06079194b9286cc626ffca4559baaa72d3
SHA5123876e1107624466fa87e1da68469b063260cc87ad20f1be4708b34290870914ee999d377df8d03f9b3264834616b812e58c4658e14063a7275c2ef9da3309054
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52dcc0b557f86bb738b92452287dab498
SHA152af8645a848ccbab8b449e2c650e6444548aa81
SHA2562357deff2800157f3921566eb9e1a9cb89dee6697948439842f5de6d5e410938
SHA51280bcb4523df19e1372d3f0d35696709caa4c811a4e361ab9313408dcf4b39ba4e1a975d1c888f7b093d30e0f707f32e0c0b9547768c6d0e47759bec4956d247c