Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
4460907a07849d901e72a7405a08308b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4460907a07849d901e72a7405a08308b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4460907a07849d901e72a7405a08308b_JaffaCakes118.html
-
Size
57KB
-
MD5
4460907a07849d901e72a7405a08308b
-
SHA1
323c0a486bbb6e842dd02000e61374be8cd22b98
-
SHA256
c2cc929e8838eecae23ceaeb23424a2863cd2fb692bb2ec6807f03f7d2ce0308
-
SHA512
578fb1946b561cd686dbafbd507a6b2621ff3ccab09c7eca027cce115490421a960baf71eafd80fc98e81f8dc77e67eec6fd25bb9baf1b31064bf198da8916be
-
SSDEEP
1536:ijEQvK8OPHdsAZo2vgyHJv0owbd6zKD6CDK2RVroNNwpDK2RVy:ijnOPHdsp2vgyHJutDK2RVroNNwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 720 msedge.exe 720 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 720 wrote to memory of 4944 720 msedge.exe 83 PID 720 wrote to memory of 4944 720 msedge.exe 83 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 2252 720 msedge.exe 86 PID 720 wrote to memory of 3852 720 msedge.exe 87 PID 720 wrote to memory of 3852 720 msedge.exe 87 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88 PID 720 wrote to memory of 1312 720 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4460907a07849d901e72a7405a08308b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc179d46f8,0x7ffc179d4708,0x7ffc179d47182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16595309841689455747,2290740985369009386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5012651b812b41a06f4c2fd3d44840f99
SHA1665fdf4914dc01cd6f326d4e36e6c55a4478fe92
SHA256981e6931e317c92e782af4575bccc4adde99f7d4d30909ffca1bb1c82bd4020b
SHA5123802a364ce9cb33ff06f48857655afaff40b662d504a2b2c8e9a17bbca666dfcb80e1008343067403770cda1eb926c5ea96121ab584710fb189236219de049bc
-
Filesize
1KB
MD5d73000d7e30a88fcad0d972ba7ce7816
SHA1fb6ed5d3debf62b32ba414f5712fbf7881d61b77
SHA2561b5515af887a60fcfc88efcaa806ec433457bb3f383c7ffd83591b7a9a303d0e
SHA5121811ed634a5a10afb6c402410c909c5f5744c94a61a145d5ec75c148a5a7baac9cdae01f3bafb0e49008a948281d02d5c2326af21cc8123fc5151658f32e7d51
-
Filesize
6KB
MD5779b756ba2cac4fd0116d1913c766485
SHA1f39a55d870683914c5fd2560e12664f4a0098eca
SHA2565336b332d23c23d02344b5218022cd86c0569f5fd75c45677d7d8a78140ea1ae
SHA5121dfa289b9c1d0ec1f65b109a6dd975850826dd61394caf827bf9ba4313c0ef80e4817284119b40c759ab8b7191dbb6401294cb0c50c022e27cc0db851b6138b4
-
Filesize
6KB
MD5b895676fb6221c97a28a63501e972272
SHA159b4cef86df9eeec3afce524d116e6359617ee9e
SHA2565f5b8cb3f426bbbf9572c733ec54436025aaa657a58e19049fd19d6cc6c48a43
SHA512cc0423d5e1c6483b1eaffdcc0345a155445269b32d0b4659b3b7502e550233dc716b5275a8952e04eb2267febaa2a05261e6aba0a21a24e2ebf3aca7cafb8de6
-
Filesize
7KB
MD5150364645d797763f01984812ac235f7
SHA192b89cd4cb99a4793dffaf97a9d704f1ce827cde
SHA2566d69acfa0b7cdb1584b41aacf64eb0c7b44f4d08d60226cb76cbefaaa72d3941
SHA51279b0dfffc93af5783aedfb659b85c9d1dafef3be120cb92704a7d760a74d3bad3e6c63c54ebc42fd474e29df9b5d2d92b14ca8a1cbbc4fee6e3df8ae82af2b6f
-
Filesize
871B
MD5d754dbe247425d18505d7fff371ff93c
SHA1a5d3f0f0b87692e8b844f748c58426c48a65d17a
SHA256ad2991477448d6e0472981513309c6f58cf2f8493aa43f6a7b7ec4861c01214d
SHA512d860eae179c75e13941b6da0e4c5396078933beaa83b80c74b206755415caa61f89800329ec1531f0d9efc872f4f7f785072acdbc7a7c165562c347ce04cea1d
-
Filesize
537B
MD5616f6545a932e543b941fd2003befd9a
SHA1d5fae8692ddf8e1e6b23e596f224fb2d5277d75d
SHA256ba38ed74f0e2578c0b45b6972355f33b8ce0f2ba3324141c21ae04f7206d0096
SHA5124341d444d9afa2475cd697cc9f3f8d4d680748a35a684e71ff9a21d3ca1f0fd772394cb3698bfbaa1b0f5bdefe0e95129ab71cda34d6f8aa8d03a54f2099fe78
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eff6f9019c6ca9f35b357b14b85eca4e
SHA157eaa2f4e39c2d84b6c111812ad5a7fe33121f5a
SHA2563f385a252170532a48c9eff44c10bc1c41a84c93c49f73cffc16417b9a562c95
SHA512c073eea9f834207ee317c069f120c6ed54adbbb30f7536096c9d852a4055900d1500472ed80e1998af4f264c9cbf8aa2a826ec6a36634b4e3de7778b86f617c8