Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
a5febb4b5ba6572594de87d2a9de6df65d49da755385bf3d3d4d054772ce493c.ps1
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a5febb4b5ba6572594de87d2a9de6df65d49da755385bf3d3d4d054772ce493c.ps1
Resource
win10v2004-20240419-en
General
-
Target
a5febb4b5ba6572594de87d2a9de6df65d49da755385bf3d3d4d054772ce493c.ps1
-
Size
5KB
-
MD5
c821f808caece75907c812c6ac90466d
-
SHA1
e03f23a8412148916734d74f1c5ac9d73ef0c373
-
SHA256
a5febb4b5ba6572594de87d2a9de6df65d49da755385bf3d3d4d054772ce493c
-
SHA512
87c3bededb3f086959c04e75d41ad182d545e5f4e5189b1f61e19e187ee4f24755dbb134b2a2ab75fbf293015de429e7cd8ed5468b354ae5071260d1509b1f3d
-
SSDEEP
96:OjYBnrUs1r4eOVv+Pj6yEkDfPh9VRPBN7yxVVRPBN7yz:OjYhrUs1rJOVv+Pe4DfPhBPBRyxZPBRu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4864 powershell.exe 4864 powershell.exe 3784 powershell.exe 3784 powershell.exe 4764 msedge.exe 4764 msedge.exe 1816 msedge.exe 1816 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4864 powershell.exe Token: SeDebugPrivilege 3784 powershell.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe 1816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 3784 4864 powershell.exe 85 PID 4864 wrote to memory of 3784 4864 powershell.exe 85 PID 4864 wrote to memory of 1816 4864 powershell.exe 89 PID 4864 wrote to memory of 1816 4864 powershell.exe 89 PID 1816 wrote to memory of 2220 1816 msedge.exe 90 PID 1816 wrote to memory of 2220 1816 msedge.exe 90 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4956 1816 msedge.exe 92 PID 1816 wrote to memory of 4764 1816 msedge.exe 93 PID 1816 wrote to memory of 4764 1816 msedge.exe 93 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94 PID 1816 wrote to memory of 4548 1816 msedge.exe 94
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\a5febb4b5ba6572594de87d2a9de6df65d49da755385bf3d3d4d054772ce493c.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://meet.google.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd812346f8,0x7ffd81234708,0x7ffd812347183⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:23⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:83⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:13⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:83⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:13⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:13⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:13⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:13⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:13⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:13⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:13⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1716 /prefetch:13⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2732 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1697946240380540169,10369068434625141448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1332 /prefetch:13⤵PID:2028
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD593ef955591ea4482aa359f1b3017390b
SHA1f1fc681650050e3195a5a9ffd432f651b3cca801
SHA256411ddf2daa185ebc1330fd840e41bcceb5f0a45ed8ad0b793150303813ab3315
SHA5127f7589d60dd1f54378059862161a8cfe054d24ee08aed6a8b47e0c95a956d354bd9fc0a27fdcccb62b85e1e7e4f553c17de1fecc51e19644ce34a4930ed97cb1
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
6KB
MD50788aa785f872a9f4e23ee46c9216dca
SHA13fdce79274c98007daf26ae4a5bcb87b12573362
SHA25600b1a51358f5670eda9846b557740137bc879b258db4486cf3e6cf9fc907b4c7
SHA512079e06c104970f8726293d59600cd79f0b6a67a0011d7d565542b740fe5d47798a0800320f035c6b2bf4bd2606d92f861b460279d343fc72b93cc81c9b6394ad
-
Filesize
6KB
MD5846216b772c7995f9731069e3005b341
SHA14300c7777e598d6a8ac3fb2a8752ee90cec01467
SHA25674d8d0324e25a7f539ecf1b64b76318eb296fdc0722bd8928920e7f86d3f7d98
SHA512c56b907560de3b2cac27668e616d2ef836ea8add5123554ba393c8e772ceeccfb7fc79847df533c95366a65d413930c13114131afb5a0c61129a6c97cb297089
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82