Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 00:11
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://kolenda.us9.list-manage.com/track/click?u=3a435025ee2bca712b3a18a89&id=8368f4bd14&e=fa67300d55
Resource
win10v2004-20241007-en
General
-
Target
https://kolenda.us9.list-manage.com/track/click?u=3a435025ee2bca712b3a18a89&id=8368f4bd14&e=fa67300d55
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1192 msedge.exe 1192 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe 5476 msedge.exe 5476 msedge.exe 5476 msedge.exe 5476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 2400 1192 msedge.exe 84 PID 1192 wrote to memory of 2400 1192 msedge.exe 84 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 988 1192 msedge.exe 85 PID 1192 wrote to memory of 1344 1192 msedge.exe 86 PID 1192 wrote to memory of 1344 1192 msedge.exe 86 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87 PID 1192 wrote to memory of 1432 1192 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://kolenda.us9.list-manage.com/track/click?u=3a435025ee2bca712b3a18a89&id=8368f4bd14&e=fa67300d551⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8885846f8,0x7ff888584708,0x7ff8885847182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,6072501862032979890,2391795361436011365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD58a2c151d3293066e04cdb9a6f51d520d
SHA1ee2f1488b58c18690f4178f950fe26e2bb4e765e
SHA2565b49987a2a9ccd3b21b195a183c9076b48e59c633edeefdbbbf00930af480281
SHA512393af7b5f8cbb7107170d39aeead9f915eb459d4f4915291733a8c0e8b701686c68882428e85cf8afbb87644ccf1c6143146ebb3afca2d4f46b6c636a9e726d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD59dcb781a9ebe1a359339f2b92fb8b922
SHA1d3367c4786c55298859ee4e0b2df2cf092ef7352
SHA2560286bba1839a86a1c022792ef9da0282c4086718c578886baef7ea80df61a90a
SHA51237f2e2e0c5cfcf0fdfb7142042048f9deb08dd8b0bb22fa2bfae3aa9aa608d939e0b5f4351809959aef5a2bb713ab93a205573e5ee33f447e7caee30a5d71f69
-
Filesize
1KB
MD5f1414830e2a4f8dfc4efd4a4489dbe3b
SHA1341de32096f13ab3c6fca17200ee75ceff44a7e3
SHA25600c9168a755678e03b39d172a18d4c84d11d7e0f785d6d037c285abaf075dffa
SHA512a36cc3e058c7e91272a5d983afaad2cd46b56cc2ca967cb0df632a193b726a3cdf6e10f7fae36d567d0078c7ba12ddd67416e476a084cc6a554b9087723b3c00
-
Filesize
6KB
MD562dbfdc68c3989f9a7d84f37c5f24ccd
SHA14c8ce870de8445c1ac338c308b734a1436864406
SHA256379a5217653559e5cb2023defd525f316e17047e9c7167f4fd2aac12d76ef69a
SHA5124376443c3cf7308b8a1040b39c0ef3982f94a36a1d0d4eb844569b93284075697c5084fc8de8df260f6249c71180c8f83ac6c56273dace7e18728d3b0b379e2c
-
Filesize
5KB
MD54b16fb743c04e36548ef4a3f9e62c885
SHA11cc68f6cc4e13a23af7422930e52642ab6dc985e
SHA25690cd7540b5964e202e7e4dc8699efc86145668bcc2e243150c9e5ec73b7f6666
SHA5127469363a792a3f0d53c20a776f4e1952e1547e7de40747b152cd5ec0442820fbee73daed41f7a309c02f83ab997175d8bf7a758563c92e44e2772bc23a75cd96
-
Filesize
6KB
MD5b6f2ec1825e6ac311c3fbf137c9bd2bb
SHA1917034d8088f66874d9f8779561c86b9ad8fa018
SHA256f651190d0e92eef1f3eaa17fb113f361dcb3e6d3b19be80780043d369eb1c62d
SHA5126fa2c951bf498a66e27c477faad6e296a43d8bd0360860d579172ce9421ac356c902cb0fae38f298c247a5fe3bddc702044de8496aaeffbbdb82b169ead300fd
-
Filesize
703B
MD50a019149dc1f88a4747abc84acb440ec
SHA1a4fbb9c5a0dd11ee3d82b11635288bba1a7afa25
SHA25699111376f327cceec2e06ad4b4fd03956273eb2711a36abeb6a77d9059664c14
SHA512110f5b116e8b285ac21ffd7fc7f9ebe4e944d75518058c45b7cfd9636ef118ba6e3442abaea0764555d3a95617a369e110e08165d294f23571bb252fe48bf7d5
-
Filesize
703B
MD5f9e6fd2c37683d771f9d512f1d64908f
SHA18b8feb372c1f9aa8f36b172b3f110cdf93b4b4db
SHA25641312e033a2a43c277fb12fa7f49be34a69c2f2e7c68210ee258d8aae34bea28
SHA512679b54e4be68408d27ad3cb59273ca5e8c5c8172b7ea6232ed91d5005921051f8fd373ef570b638441e6a3a325bdb1446bd993b292cefba5c10df02e1ff70f58
-
Filesize
703B
MD569afaf95baba39852fc89e77326b0c8a
SHA1936349b2e1a18d995997cec1a5c4a98dc6f4ff76
SHA256944cd7bef53c4ef2bb2eebcdcefde41b9bca53d3bb0872ea072281e49119e7b8
SHA512e848e05df9bc4c399d6cc06e58936a911a83709105c0606d134943944f145213e50b20684952cb5049ff09f413be19e49440cbd3fd4d68681e4dd0ef7eb447cf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
20KB
MD5e8e1f8273c10625d8b5e1541f8cab8fd
SHA118d7a3b3362fc592407e5b174a8fb60a128ce544
SHA25645870d39eb491375c12251d35194e916ace795b1a67e02841e1bbcb14f1a0e44
SHA512ca77d40ec247d16bc50302f8b13c79b37ab1fcf81c1f8ab50f2fc5430d4fabc74f5845c781bd11bb55840184e6765c2f18b28af72e1f7800fe0bb0b1f3f23b24
-
Filesize
18KB
MD5d7a02f507155c5fa9d3a5ba3d3e1eb6a
SHA15b01ed0593ab8dec76fc2c68e2857ebb1d179181
SHA2566a455720692413962a0d3c0acc8c1d383bab1f92f7998c03ee92bebc01b2b911
SHA5129e62f0514d08457ef38d39f3964d467dc2539855cd91f19c312d1898fd83d5cd456571cd7a38671408198565a085384a70ae1c569b68d09f02c446c261170f8f
-
Filesize
11KB
MD5f4529c34ba12e9d6679b3669cc99c6f6
SHA13b6fda83bd67911b848e776cf14225f8c5a1613d
SHA256f4730bae86119c13ae150485d2375c42815eddb31e72d46a612de4ab68e6fa61
SHA51246cae212a27e5ee3ed8707078eac4e66300199c954551a6280d87f50d9e01223c34b83fa3d0c1ad222c92b82e810dbca6ecc88d7ee11b41e2bcb7da9848d58bf