Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
8371dbcb083cb153cdb17128fbf3c956_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8371dbcb083cb153cdb17128fbf3c956_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8371dbcb083cb153cdb17128fbf3c956_JaffaCakes118.html
-
Size
50KB
-
MD5
8371dbcb083cb153cdb17128fbf3c956
-
SHA1
7b020fe052821d833cdb182a574ba588331538e4
-
SHA256
c96e10c24251b7ce7e2744c2544aec005b0e76366bf743a2f06b84ff72ec4381
-
SHA512
55383d111996df87a29750942205050f08e64c9a05425918faf2ce8a63250bfaac942d76213f50b4e9381ed7e46ef77f34d46af6e2c9c2440a05ff1696d2816c
-
SSDEEP
1536:GjtjMLV86ntNk766568gxixC6cAUHUopiLFu9K0V73hH92PZNL4KTb5zug:8oV86tW76656hxDAUHUopiLFus0V73hS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 sites.google.com 40 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 1800 msedge.exe 1800 msedge.exe 3724 identity_helper.exe 3724 identity_helper.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1220 1800 msedge.exe 82 PID 1800 wrote to memory of 1220 1800 msedge.exe 82 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 1432 1800 msedge.exe 83 PID 1800 wrote to memory of 2864 1800 msedge.exe 84 PID 1800 wrote to memory of 2864 1800 msedge.exe 84 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85 PID 1800 wrote to memory of 1872 1800 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8371dbcb083cb153cdb17128fbf3c956_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd08d146f8,0x7ffd08d14708,0x7ffd08d147182⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,15517174748653770823,5121775848957633270,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5476 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
40KB
MD55ce7bdeeea547dc5e395554f1de0b179
SHA13dba53fa4da7c828a468d17abc09b265b664078a
SHA256675cd5fdfe3c14504b7af2d1012c921ab0b5af2ab93bf4dfbfe6505cae8b79a9
SHA5120bf3e39c11cfefbd4de7ec60f2adaacfba14eac0a4bf8e4d2bc80c4cf1e9d173035c068d8488436c4cf9840ae5c7cfccbefddf9d184e60cab78d1043dc3b9c4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a351cee3721e42c3199710a1fec2c117
SHA11ccd117d9d7d1777ccd9348a166b5075e9d14e49
SHA2562dc040c17dcd62f65e8b9af9a5d75524eced16bea9cfd105193f5aa5b25482e3
SHA51209134c76c36e4dd47f0f15361a3b46df36b8b7ee685244c5591556972c18583c0abcc8a03d5f6581a91bd5290cb13ac2ef29b299e86835a60093da57d3a03cf8
-
Filesize
3KB
MD524dab65c63425659ccfd9aedf77a3bd7
SHA1a5e368cfce92daacdc942e7d65619f37bd6156a7
SHA256a50b2c313ac0c0a65c8bebed3789c82df541093290067773f8445f095f65f9d9
SHA512f648d6bf63ada3dad4b33a73f74d3b1b0b71e66cb6ce6834e90e967feb1d79066ab55ca9d547800eb40832216366ecd1540e244638ddff1431f5e37fec1b2628
-
Filesize
3KB
MD58d983df2390395a9a0bf10026ab1ea19
SHA1f7ded3529ceb128f51a69409eeeac7abe1c0bcfa
SHA256243ee50f7047ebc1d70e298a4941e01c1153d505567be08ff3c59e19002dabf9
SHA5129f52cad69247f5042c2a910fa8c60746a15e1ddd2383a8b361b927c556040c03a8d3d11c80682a4632268cbfc9d4429210d7bdce48673e1035998530c5a413a6
-
Filesize
5KB
MD56c944c1f71a6019b6cd02a6667a7bd62
SHA1b1f48f4bc09493473f1b2c4f014ca455fcf857ef
SHA2567a81fbb87928fdf1cc2f5c3d123621b37630b06dfe7e26a4a1ff165c04148779
SHA5125460d2bf7685a87116b36b9c5c817cbab57644defa7ece15e4ece48b88e5bebc9867b493ee7855a99e5de40fa94fcb937c56cb52b49a85ad313057fc9fe32f65
-
Filesize
7KB
MD5ba2f8981b4b8acc6de7ecd375d07cae7
SHA1319b8bca048c42d0a29ae93f2e93665bae74f3c2
SHA256d30d65c59f7773c290d85974480954d67629e67573e3dddca1cd0e1af60ad8ca
SHA512383b92c61bd4f8eb4ec1e05d48be43406a9beaed0e0152ccd07416aeb7266f3f5d0148bcc1dc7adbe6da9814949aa24e8388ebc974285da578a67c5136194da4
-
Filesize
7KB
MD58380fef22de7e4d79f528d997cd6990d
SHA1f03e61aef1eb543a3e16db7dda50cd92af0bcb82
SHA25622f180f9df1ea9d993afd4dce2f84ca014fb17311d2ecffb6a5c1b993f587ae2
SHA512924da300317c31ec60a05775a820b06d33f2576db73b3560136362094ce9a1e94fb0d3e36089b793a04b272a623e3187ff22a8f8ef86fc166c64d9f68e1d8cef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD505a82fcfb43da694485a93b85e83407c
SHA1573208893a73284e50307386366f0bbdec06e6bc
SHA256389154c69460d539ffbb57909212c1746e42ce8bda00dab7b0ecab01c501a7fa
SHA512c9c10c13e23fc081fabd827c0c9ffb0fa7e354ed339dd2ab57296a0e83fec26676eaa05878df7b3d6cc9e75bc765ff1e5cbddd522a6aaa46d7f9916f71e2f087