Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 10:34
Static task
static1
Behavioral task
behavioral1
Sample
66f672642683be382211620bf1061cb4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
66f672642683be382211620bf1061cb4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
66f672642683be382211620bf1061cb4_JaffaCakes118.html
-
Size
175KB
-
MD5
66f672642683be382211620bf1061cb4
-
SHA1
0127acd8a6988e6987112ee651314ab8037980c3
-
SHA256
70c11acbd888f43939f745704aaa0b6ab10670abdfb594294d77568982db46f0
-
SHA512
7df23cd250ae4db53473baf139644b7d4ce0e70e9a3664ba7c921b54bc3d83f446272371e03cbce7ecd12d7ecaa128df8a572205a28564cc147c73117d362fc7
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3jGNkFeYfBCJiZVc+aeTH+WK/Lf1/hpnV+:SHCT3j/F3BCJi5B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 2680 msedge.exe 2680 msedge.exe 3772 identity_helper.exe 3772 identity_helper.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe 2680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 5088 2680 msedge.exe 82 PID 2680 wrote to memory of 5088 2680 msedge.exe 82 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 3232 2680 msedge.exe 83 PID 2680 wrote to memory of 4232 2680 msedge.exe 84 PID 2680 wrote to memory of 4232 2680 msedge.exe 84 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85 PID 2680 wrote to memory of 1308 2680 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66f672642683be382211620bf1061cb4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85d2746f8,0x7ff85d274708,0x7ff85d2747182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:12⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,15907069069625565258,11397060712095788962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
46KB
MD577e80163afc68a70c09233f24c52f560
SHA103cfd9726d36b43c3b139ebcbe95c5a28ba5a953
SHA256acd729fdd132db79dc7a270cd50e19f5b7504b880936c2e77c20e5caeaec06a5
SHA512fe3456727a5d66fe47c89532141af464a14b3c0985c843c33018a2cde9b81bc1debd5cc201ce4dfaeaeb754236a258f45d666d9c905479c8f30df45b286462d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5128d4b13659bf9e9937355a68ed482a7
SHA1a27808c4e44cf44c4643d97ff34203ef19eadcd4
SHA256d1a4be7b23c38272b038960f905a4a9a417fd1ab41053261407622309a28df3d
SHA512428fb1e46d8ccab4eb9fde2e98ff01da6fc8dd262a32419efb1cb9c6165a167d7c6803e0d5bb027e78bf382a5a3e44091c31ef6f40b1ddc0d3c60256200ff0bb
-
Filesize
2KB
MD5c065f96e2fe6bdc172628d30d048535c
SHA1780c0bff714249b40bccd571dad1266f540b87e2
SHA256d960f48e4aa17f0ac6b57266df0ca114779200c4be0c6005b6d45326672f0b4c
SHA51271bc3f409b6e2a078cf1085b2f26faa6622423983fe47021c345bcb061f56c20f458008822f13fcc686f3ce2bef8f5db1f768f48caa03985139b6411c0ce8915
-
Filesize
2KB
MD5f8970f1e000ab843719c1e7d4eb6079f
SHA14ec58170199d9a7ee032d5c95059ce6e39db1d59
SHA256bf9ca20b29147bdf318f5a7c381d0b33bcaed079ea13c94f0f8da98b3aae911a
SHA512b234f6274bb5f08e0de76eee91ea4fa6560d1eaa6a2438e88380fd67bda5978ed017b56dfacdca16f39b17eedb2807b11753828966c4ab254a2930994debe289
-
Filesize
5KB
MD5f1d8519cbae6523e6d155eced1e651a0
SHA18c161613f931baedf3190a668633d80dd07389bc
SHA2563c8fcd1057f54c0b9f3e10663103899a6224e8e15a95015aae21e4bab5796864
SHA512505c85df5ac94e9e4e473e4bf9dca8fbe5a0d06160482b352bb2071ac064e2cda6bc9501e2248ec001ee0ab189b85cd87a8595ad683fda2aedd5e577c9f5946b
-
Filesize
7KB
MD5e10f516733ef1a06714a588249190856
SHA1b36dfa0b0c3862c236d6eab542a88a2c112e2954
SHA256ea25c608b38ef026be9e7f316a33985205fc32d834db31639d90f82de17117ea
SHA512490e215a0d9c15fb84f705ffcd659a83da2a24c24d3094e136889642b09bea794f68cae1c3c1be027cd8674dcd8ca3593ba94f92337f7759698f84e6a7ef4070
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD523b4303af31b364411067047fe9d3ae6
SHA16b6659c4a2ba332611c1e921a77fd19fd0d8b2d8
SHA256ef1fca7d7844c4f1b881925b617445d915a0f89f193452e0c8097554fc910789
SHA512299880e83208422f617bea486e9393bb8e367e089a325117f28eb875ec76ed933e046d15b4578114ce18854a977ca4efe4dbfb65ea4f074c1ed72f42ffee1d43