Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
886dc4c483a898a72d55f92393652de7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
886dc4c483a898a72d55f92393652de7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
886dc4c483a898a72d55f92393652de7_JaffaCakes118.html
-
Size
52KB
-
MD5
886dc4c483a898a72d55f92393652de7
-
SHA1
0eb9561c886f758f27659743fcf81688fd3d6db5
-
SHA256
cb33e501da80947fa9906fd98f2b18c95fc437a4bb59a5757bfb53dccca01123
-
SHA512
d323f9df5e5ba6c2803a4a48daa43883e623ce578885b53d1ba9b9373de01b4346914c22cdf166155ac0d0501ad49b01ec80886145a1c5cb309bf95ecffb61d6
-
SSDEEP
1536:eGIpBvSroc2eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeRr8RL+q0NNNM:eGIpBv2oL0NNNte
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 3368 msedge.exe 3368 msedge.exe 992 identity_helper.exe 992 identity_helper.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe 3368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 1648 3368 msedge.exe 81 PID 3368 wrote to memory of 1648 3368 msedge.exe 81 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 3268 3368 msedge.exe 82 PID 3368 wrote to memory of 5008 3368 msedge.exe 83 PID 3368 wrote to memory of 5008 3368 msedge.exe 83 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84 PID 3368 wrote to memory of 2168 3368 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\886dc4c483a898a72d55f92393652de7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c8546f8,0x7ff80c854708,0x7ff80c8547182⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6504 /prefetch:82⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6432 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13444511145505900245,15176156928055417536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5516 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD53b1c692a0ae5103d4f1ebadd0c071029
SHA1593d4e8b71ea65390e66c51bbd2524dfe3587cec
SHA25608d40c827fd45a1d855d2871a937082694ba88a12d7f52b2a4dc6bc5711e9f10
SHA512afa1b150f9e840b4dd87e238e9f5996d66f560db2dc0367ba41cf8e26d2a1c638db27c0aefb881c1447155d534639e4deba4a54706e20dd05986415ac80619b9
-
Filesize
1KB
MD5e3a2a9b2162d6326f1a590d52cfb5fde
SHA1d7adcb186cb19cba2be92478c4f3f986ccc3936b
SHA2563c3aaee81a9c4193a5d8fdbeb6693fcc628cf3a6bca021dc9b7997e48eab3567
SHA5120ddd39d3648defdd1c768783777f54efa537cc83ae42e0b359eadfaa1d433e2f8c8f903243893590393d4c01bfb57a5e0e24f5b14e87afa3b4ddb0c004c8ffbe
-
Filesize
5KB
MD5afffda1035e02abfb35f594342bb0adc
SHA19a8bc613c2d69299e162396d556c0e543acda533
SHA256df94a038ce156c18f0c50ceada0c7547c3dcaf5439916e1dcc9a62a784cfb202
SHA5120ebdfbbceeee1bcb7db377f077048b60f6b8377eabde2651ad5854eaa797bc011a99e84986272a7ccbc8233abbdafe10971dc048fb4241e8f793121dfbef5a08
-
Filesize
6KB
MD50f95fc5e63232de4d71382e3e00c3eda
SHA1c6a94ddedbb36e6b2b0fc7b2657976c2a74adabd
SHA256d2fd8d7fe4ecc472c6432332dfee3daf83ae876d6f4fcc6a73be7238c5941f89
SHA51243181498e3a507d8cbacbb181482de2ea1905615062969e8e1a82aa304a8c7359a2c7c729fcec1daac318ff5a2b6e1a1fd37910b29117dbf8bf0f2e6709d5223
-
Filesize
6KB
MD5c34361c7bcb14db911d4b874dd7b6c56
SHA126c6eb8016622ac0dfa64fa7660aa4e2e7fd8a42
SHA256b40a12597f147e6215b62ecfc6ed1c2bb8e43919eff702794683d076ba44a7da
SHA512aa4a7a8d70d2e14538d92fbd669762822672d1c9e8c03f5398f6af1ce7ec8113b11b78ffbd3b2bee6ffdc062dd846329af23445a083e6295897cce5567adec38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56bd71830aa4081938c26b4bd18622c2b
SHA156daad2a90ee6e9781f0a0d1de55dbaebb948325
SHA256d598714721a9bacc34db4b1ea313194c23cd3b767c12ddd2e80ff53992fda598
SHA512447e077840b91f0cc57732b4c96e709afe566014e0bdf6dd02e44c431b09f92d580cfcba06f3496dd2ecfc5b85367775b9ec4ebd4e5c405da10703beeae8ed96