Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 16:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gamejolt.com/games/disaster2dr/780541
Resource
win10v2004-20240802-en
General
-
Target
https://gamejolt.com/games/disaster2dr/780541
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 4952 msedge.exe 4952 msedge.exe 960 identity_helper.exe 960 identity_helper.exe 3932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4948 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1132 4952 msedge.exe 82 PID 4952 wrote to memory of 1132 4952 msedge.exe 82 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 372 4952 msedge.exe 84 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86 PID 4952 wrote to memory of 4316 4952 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gamejolt.com/games/disaster2dr/7805411⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=2784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15586141513479298535,17731794159839764118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:4044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x240 0x2441⤵
- Suspicious use of AdjustPrivilegeToken
PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5bc8017cc5c1b5a35b0e04e2a2f7298c8
SHA1f084968828f75a38c024385048c6b9830b58ae4f
SHA2560442dba46834f0c99a5a5e50f3b40b4f2bc6cb06289441b95218a8dfd5980ddd
SHA5124e0ea989fbfc5ef312dc1485d0de47f7d820c0a1e56a15cdea58c63e35b41009683bfa173bfea270107c1c1a8994d7eefc21f60d8b2202e96baa8c8595a13e6e
-
Filesize
6KB
MD598f3479d189db24d9841ba467b1d2c92
SHA18862cf922071a6aa0c967a699771e93bf8c2bab7
SHA256550a12df7edd234b2b4aeb3be92c9784b73317f810618312ce6d18dcb832a55c
SHA512edc04f52b8f184447a81566c60e5a32461a19ece43cb666c734e7278333c89fa936902aaa18f5b6bd5829e2945fee61b3091243db328d6ed068b074909c89018
-
Filesize
8KB
MD55485a900af2fb0d1a1692afacdaf6def
SHA17d7cf7098ba916199eef2a58c6736018a597b028
SHA25601d7ff99b08b5a98b0ef1932118a5f696a122fa46948ce4a1543336f2f0f3d09
SHA512f3f1692918ea3b95bd83776bbe7edc1b5d3e71cb7d2bc2a2c34990238aed4819317408aa98d99e19f8d190f24d3ccc9c665807f780d26f0089966968b3ea5aa2
-
Filesize
7KB
MD58d9f39293c7266de770f7c1e5f0fb028
SHA1947d05eba666aa837e44779dea8e81a6ea9b35fc
SHA256bcc196137e2624e703b086264dda75c48688d08ae3ed32be61c5c57ed4ad29cf
SHA51274bc8657f81ec7dcb625ec3b878d64f1252df2fdf19f0b822702dddeecd688bec1e4cc2d3c96b52cc3b9f4b3b1729166c7143aa87f594e469f155778bce2c1c3
-
Filesize
539B
MD5c3101ac1d0aa9b006824acee225a7c52
SHA17b45ac7668a3ea9869490a21664cbf3e446ae4c3
SHA25680dea496399fe97ec3754533e25587431d7cdcebb9353d9fd95f9a427709ede5
SHA512ae6935ab31c4f4276e95783486ee2aa60598d0bddc27ee9cd9d7bc03d3ef0585f64d41908227da82394e3e720e2d307ae04792fc94b0e6990f4dcc6050472a4e
-
Filesize
539B
MD51b0f5b305de07175f6c7b8e51678ff24
SHA18766f1b3d984991d6050e854684d9b754f4e7a1a
SHA256de94801e3b1c66e4a0d8d11fd2e410077cb29e26ad0e6eb22fd34a9f98b87f1b
SHA512778882f6eb153fb492bb510aee4cac39d89cfa88bcb45f1aeefd5ad4ee7fe2b955fd51cda42f786bb3e97f3c518fe3a6ec07ee61df6b39133feaf505ab7cf626
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51134898a14204552e9b258bede2bb5ea
SHA15647072e88844136be0f88fd5f5427f031844467
SHA256da41313dc2c3963c6238dcd2a8bf4f11dfdc7324b4a47cceb3fc037e0df3c6e7
SHA512bbfe1602359e2aab569e50ba6dc5da7c4046375c0ad6f4e2593005a0f2a43d039f34bc2308478ea9e6e5acc57fd07fc7cf7c0f6a8625de5e62de291ab4378845