Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
73e9601b6832fcdae931e9d73c28c9ef_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
73e9601b6832fcdae931e9d73c28c9ef_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
73e9601b6832fcdae931e9d73c28c9ef_JaffaCakes118.html
-
Size
341KB
-
MD5
73e9601b6832fcdae931e9d73c28c9ef
-
SHA1
061ddc42cb25b06a8ec39a81dca8dbae794036cb
-
SHA256
fce94533c2d6d3393fec1d17080ca52d4e67126a4fca0f0291bc4c2035773d5b
-
SHA512
f15665c72076dd1e6dc8caa37aec0aa29474485220599d3cbe8148f42c80d2dfd5043420956b8fe69ce7e6d3a5d2f2695137de0427e919aa567d5bc212315195
-
SSDEEP
3072:b2+fL868G65qD9Jjc8cUxV0HIQqiHkueFMg:9CG68fbT0HIQqGk7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3768 msedge.exe 3768 msedge.exe 4644 identity_helper.exe 4644 identity_helper.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1656 3768 msedge.exe 82 PID 3768 wrote to memory of 1656 3768 msedge.exe 82 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3820 3768 msedge.exe 83 PID 3768 wrote to memory of 3608 3768 msedge.exe 84 PID 3768 wrote to memory of 3608 3768 msedge.exe 84 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85 PID 3768 wrote to memory of 464 3768 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\73e9601b6832fcdae931e9d73c28c9ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb97446f8,0x7ffcb9744708,0x7ffcb97447182⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2312 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9600492084047427920,17836630659035007517,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
1KB
MD5835ac3b95aafeb20c265dd52304f7cb1
SHA1e4d86cd9f762ac056806416e92398edc8070f086
SHA2566aa82586039fd64913a860ece3674ea3fcf288de708cba7d3436c57a184caf49
SHA5126ad0e4237e4424310ec6f0e28edce90fb7e9473c2adacab3f8243b976020dc490a512e2333ad37b36f44bfb1dfef8b4988645d9cb07c7b50ad6783743fde7ed3
-
Filesize
1KB
MD54043362210a09e90a634a38ac836d508
SHA1d682ed8396f28a4ad774c4eb902bc4ca0ca284bf
SHA2562484d6960a7dddf199ef1d80c476b597d0414f85f5b2df914184fe7d77557960
SHA512055a1b475460ac99436de77b1a1f7272664388936036ca87a65f30c2eb7ecd88169f0f29632f49e1aad590d9d7fd63da8f70a2042d30c65080bbeb19220934c2
-
Filesize
5KB
MD5e15b233d9b8e0c4e4c5a3a2cf061a6b3
SHA16c13d2001dac5f0b47b847d8033aa8b4be4d3e77
SHA256e4a42b0f187873c4070e9406da3acba253abd187ed78cf01363cc41e846f2757
SHA5123dd9eaadabcd323d9b8b4e86b0c8b9fd80d0117f69a6b0d9e552d96cd10284c2069d2e2c7afb68c0b444ad849ee27b490d91c8dccff18844aab08a13fd7c4288
-
Filesize
6KB
MD59828de1efff52bdee22377759252e95a
SHA1978db0ec38424fb7c7e434602bbdb0922c33cb35
SHA2566a1e938d36fef733f8557c1685c8e964c010832c507b5555b3713e8b639af098
SHA512ff336c8b041ba38ed8a5226f0aa047320e16f3773f362aeaa3a8c313555bff5798b3d37efd7da7b6223a9924c5259edaf65668baf6dcdbae31556cd91083a613
-
Filesize
6KB
MD57b3e9275b8e23cd8eb19a7109ffa359a
SHA1af6db8bfbb0561c784abe05b319ba3bb63bd9ff1
SHA2566ded488c0d82a5290c802f818efe3633979ab5a344395cc35451cd34ef467551
SHA51217cc9e0c810628eee053bf89fc2555d1d3cc87a6a4b691b6d938ba20c34f4c342d6360df4e9eef9b1c955220f53c72e21ff464c7d5d5761f7f2e768ac50654c5
-
Filesize
6KB
MD5eb9ae328a62f6ed679e64e307a7623a2
SHA1348ff2a29ea112145f22d89c29877fb1c9acd9e1
SHA2560a60f5f11259b7859f2cc9c82d6f37c1f759864af42f334d9fadc57dc071a27b
SHA5125f8cbf8a5240647c5d17230c44e5e954b5be4e543781bf34506f07812e9b643b89caee987a6d1d3441834ff9d5237b10cf5d51f84ccba284a46fceae8998f782
-
Filesize
698B
MD55f4069fc158ab8ff9448143aaa4b01e2
SHA14739f187fc03d172773cc88140d22402938a2536
SHA25603b581e2fc2731c3b820ec74b4947fa175df27d5c772d44acc3bfd87f8b93aeb
SHA51222434db9c73b7bae2af9ff1382f5d153cfbc3ceaffc21c532a1d099045955d2fa165904de9672b356c15d78bc079c369c4a3774cbb2e35df507a1024ecf0a2b2
-
Filesize
698B
MD5d06c0accbadf1a9ad1604289438e5cfb
SHA1eea888c12fce1c50a886bb754a0052ab602f0078
SHA256cdf540961c46fc9811cf65797af07193107caea32d492f35e0831da5b7b2443d
SHA5129fac710e34e8004bd6ce0cc6664fbd841cac7ca48824991c11197a17290a9e2ce8feff3629991d3c439b4ebcc87abc33dfe24d5e8f297fcfaeaebf1131181b4e
-
Filesize
702B
MD526b212bdc319099588352745c0ee3279
SHA12031e277e51268c6338c66b555537dd37989ad02
SHA2561418706fd017aa46be3582dab71b84cf33efd63d07d1528f224bdf0f20d58348
SHA512d5dad33ce842f41f879b417188448607f64bb4044d8ec6b29e7ed3a36434e4556e9b2e6b1e84d083d5a8ce1d0e1b54c287b599a3dcff9c56b401c2b0e1bec75b
-
Filesize
368B
MD50c866f08940fa54554176aff2d11b967
SHA18930c37261291ab34707e32c6a4dd58b075ac5cd
SHA2563f69b18da64b970794caa23fc974468170d38a52c7181a4c7e4b388186696027
SHA51267f41b7f2d148b9eddd16d5f62a780921528b891562d335f7a11b0fc656b7aa4a07dee47cd8b64f3e525438dac0b97a5182420ec7270817c1a3f83a50d1b2324
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5124e7654ee0e9b3e9acd8e195c6788ca
SHA1b90e30658d7c99782de278a3af72358656258ed8
SHA256eeb5bb766f71b1c3b404bd3a6e8b67de43e87fa5a24fffb223a4ebfb1d5b6529
SHA512cad1c00b218a8addc242b956b370216442db2a60f64c009421e0b31acbd321f04eaa0e040dce28f6222325d5242b47e5fd7780cbbf9ad1273c433e85476cfc46