Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
ac4b4f0759e4398aec271a328ca5ae1b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac4b4f0759e4398aec271a328ca5ae1b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ac4b4f0759e4398aec271a328ca5ae1b_JaffaCakes118.html
-
Size
49KB
-
MD5
ac4b4f0759e4398aec271a328ca5ae1b
-
SHA1
3cbb66f352c16c51f33a63481b0d40b1ac38cb6d
-
SHA256
406f84df39148acf57193e0e13c03d30d815ccd1506ef85235548cd2db076e7c
-
SHA512
64163534b5fc4efb3ca16f05726f25cfbb86a8fb8f23d7999dad85b58ba82c3e8ef860da2bb4d545eea4bdce97c829e313dcc2cda8f70ed8b14851b8e09aad57
-
SSDEEP
768:GPBI8Gz/pumYBILwF8QzHJL2cY/3UvweOIhdv:G8wRzW3UvwIhdv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 4804 msedge.exe 4804 msedge.exe 4068 identity_helper.exe 4068 identity_helper.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe 3696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1656 4804 msedge.exe 84 PID 4804 wrote to memory of 1656 4804 msedge.exe 84 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2680 4804 msedge.exe 85 PID 4804 wrote to memory of 2816 4804 msedge.exe 86 PID 4804 wrote to memory of 2816 4804 msedge.exe 86 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87 PID 4804 wrote to memory of 2972 4804 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac4b4f0759e4398aec271a328ca5ae1b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8fa446f8,0x7ffa8fa44708,0x7ffa8fa447182⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,9488719974396150501,12114479503389764283,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57df6b363a66b1248520e66d3b37ea224
SHA1e4a5c0ce3c876f892cd4021f63683ac7fb3810d7
SHA2563250d3debe9649a2b50d1b0d5410a63ca5b17ecc361de2506a0c16d1c2816788
SHA512e892b86aa64004fdec6ebcf3928ff715f5ae86267758c936051aab880a90b29d4f00470039f0f0803e9d80a08ca2616766e549b5ad7938f394996ffdcbf88bad
-
Filesize
1KB
MD56230e9a5f36d2a35f5a72e40fadf797e
SHA11cc3818bb67917786ece21cf0cb1c12e731e1e80
SHA256967d2a59dceb422cdafe8cb1c2823fa19670e3971dbe0a0b2759b2dd1ec04d3e
SHA512dbaf4f0c47388436d6d1dbc705087323a1eca1cad19e40c73ec1b49583e93aa61a514d19a044496b77ba5e56cbf9e54dc322de900a4a7985f70bc1ba6a2379d2
-
Filesize
5KB
MD5cc465a017685bc8ad0344aad488e0f2d
SHA1d7d37e19cfdd2d10318d41ab30182553ea9f0ea0
SHA256564e687183c26976c73e3317abb72bdb2194a7bdc2d724dfca22878ef8e5f2f1
SHA512bde6516ba9aabc77ae07580a677eab9e942c897041e6f75db0d7803e44299551588f756abba677df0e7b2172396dc59445ea75835bf65db3ef5db8b591feb23d
-
Filesize
6KB
MD5e88f2ee8ca339db69a328d9445e435cf
SHA1f48996df4f395674d7aedcfb7680f752714db53a
SHA256b4f4c7079bd03bcd73ea8edcf99af0aba1c2d15cacaf2697d8b685ae38056ce4
SHA51278aadd64875200728ff8e51bde7bc11b114a4463ff93e15d9e8a3a959582824d437292f9ea287725e431ff29b22a65dafc62bb94726196fe38d88c703f48202d
-
Filesize
6KB
MD56559ce6fdb5decad15f98f25f2da65ce
SHA1e1647c73c09df8abd02b18f2ccd4052c52e70550
SHA2563df4eee329f94e89e1b64396033e718df4ae80f0b20f5d24b3a3abf768ef9681
SHA512665e069fce3fae9587da83702642fc0d3630bd4e77e4d194cdeca8461ba16374d190ee48827288436f27cbb6a2c4acc22ce4657bfaeaaffa733b564be2da2328
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55e8f42c6d54c5af1d3ebd7dd3bb2d115
SHA148cff1dbcc75689e98addbe2fcd85ed4c6e8d9e3
SHA2567621428d28ad1de4cace844d2dbc7ec939b94bdfff45e33ae39c37c6a6904d6a
SHA512d4da98651a447bede2d182267d63dbccc3a75c843c666cc785180ff4f52f788f469ab9a8c47707588bcbc3d9fee8ad8e2c565fe755a8e6f0dd2258d1ec8f50a1