Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
460c0d9dfdac07bade7cc4beaeeedeb7_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
460c0d9dfdac07bade7cc4beaeeedeb7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
460c0d9dfdac07bade7cc4beaeeedeb7_JaffaCakes118.html
-
Size
400KB
-
MD5
460c0d9dfdac07bade7cc4beaeeedeb7
-
SHA1
67f77d566231a950e174f582f164be9280c21c22
-
SHA256
6468a1a92863b1a09ed19bcd2f8b994a9118bd62e5475e4b3fb919cbe22df243
-
SHA512
66acaf40c954971273fc4754aa062a7cd1ec2f41d49c7ee19684237ce47361f80ed45c458dd2436c8b75bf7f59af893e4c00ab943190ffbd8ac3da117923134d
-
SSDEEP
12288:cpziQ2wFRbgE3Q0g1IPt23rl/Zsloht60pel8Bw:mRbgE3Q0g1IPt23rl/Zsloht60ICw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5104 msedge.exe 5104 msedge.exe 5088 msedge.exe 5088 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 2812 identity_helper.exe 2812 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 5092 5088 msedge.exe 83 PID 5088 wrote to memory of 5092 5088 msedge.exe 83 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 2576 5088 msedge.exe 84 PID 5088 wrote to memory of 5104 5088 msedge.exe 85 PID 5088 wrote to memory of 5104 5088 msedge.exe 85 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86 PID 5088 wrote to memory of 1968 5088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\460c0d9dfdac07bade7cc4beaeeedeb7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd421f46f8,0x7ffd421f4708,0x7ffd421f47182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1796 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18026061821985698856,5085209315196178354,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2188 /prefetch:12⤵PID:3740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD515d5293aa14a01dd522b1bfcffb62be1
SHA1a3fa8af27eed89126f3d8b8a883e7ce5bc811503
SHA256a1cfb221df786b1500ab3944a38fb8e3af44a7c66725b0f77b5dccf994c07caf
SHA5127d1c0f09ab46a52a98ca24c1de13b7839d21cfb6e2ea830e41ff2b98cb30c01b8d6a0b4501877d570ac27cba3447518cd7d21886f5b163fb5b2b6a8847159dec
-
Filesize
2KB
MD5b9bcbbaecb2ecee63471a44bb32e209f
SHA13c81fda82d5278f13cebc4e706852d1268786fc1
SHA256125c5bc582aaf09608ef2db31541873aa0cfd4eb864de8f67ef45be86c69cbf3
SHA5121b6fda6bd963e83a84a0327029261dd3575cd53be4f70b7ba3d5dc8f859e79c6f2b186c198ad886940a8dac9665426c5fbeb48421f5c7044f0113003793b4e8c
-
Filesize
986B
MD5189311c81007257acb40bead45d2e1aa
SHA177d7dead2887f2eae245315470dc42139eca641a
SHA2567e61e5da71ae8e0376a07579e1b3e297783648b864c979395ba87e1e64909909
SHA512dbb86d5a1ed266c04aaa905dcf8be64f4a50917f3872fd3b95698ac4944d311d90b84be7dca72fc722bf577c23b2694e3e639cefe7b0f632e1732b4f1bc9f7b6
-
Filesize
6KB
MD5c8b79c948dd467d806ae5c60031ad29d
SHA1bc5c30f864edd736d16122b041fd78aef57aa4ee
SHA25647521e9396fd9c53e417e89d2c3eef1cde9edbc0641c39223a716ec489dd3099
SHA51234277d373398d0dffe151afe8c223c8b36417e6dbe9bd462821d5c2c519637e5b0e3adbfa79dc5c487f65dae9702391feef7a1b91e7515d6e4c22a7c0e966ad6
-
Filesize
6KB
MD545ac1910ff602b460700a578f5e97157
SHA10765089a6574b8c920ba5d8be99ce5eb8cdf946c
SHA256fc0bfd444145d8b2dc21c13fe913da99a25b27ad56db7b17fb453a4c0ffbb601
SHA5120f2dd8589ea1d211a6fd679eb2b6c793ea0f1a912428d413d719d42ab2486e96e02808addb4a8bfc18a9b31061d00e331cde1a898be59601d8cb377d792171c2
-
Filesize
6KB
MD51d2ed4f1675bede169aec3c425ec05c0
SHA1217d31b7cdc45bdecab7bc2cba1ad6c7c7abb0a8
SHA256a170243e819928b3eb2083a6890d570c5c07f7e1e57450c97ba3a022fa7dcc08
SHA5124076c667d23ff25676e5de41e70c758c4bf537a1d76b895d6154bbc1655f8eb1d142c09f159412c3fca01753ae49a9f4dacc03b55789fcbf70c9c0ef72bac01a
-
Filesize
7KB
MD5fad743db55d2f523d5617e9e78b1e2af
SHA199d923fc4dae65fa17593b67e1d90dca24db516b
SHA256f0a1fc776955dea9cc8dfda233b446d3321dc391d1fcba5bf4e8da8cd58b10ea
SHA512848a4a1fc3b362314acaeaa37b23b46bf377005bfdda02929eb15f3ba4697290ff62343d92d61a4b9cf86eab92dd242ef8b84020b93067bb8f41f497aa312b3b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b943a2b6a72106ba6a62d954b15afe33
SHA181484bc59a15257cbc73ec7de7a18508d9323f39
SHA2562e5fd66d99855991454522c7c64d52e2c171f6d48d0b8f24946c1625a447d7ae
SHA512d12e416cb019469544d121dfcfca878e90eb7f4b61964e71fd400b7fa136a669d7f5ba746788f74fe4bf9a6f04abb65542aad293cd148c3dc06875e3aba5942d