Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
b164ab425c6da0f65f183b1ad24d1974
-
SHA1
3dfae5412dcccecdfa3c3eaeeddf3bc0a974fdcc
-
SHA256
9dbe2dde2a23142d494b732ff50d166450ac94e81a2a3a51a556563bcaf535cb
-
SHA512
56c88b9edb904c9584542a4ef35754426454e29ffdafa4b4d70cc16008f848cd135e145a6606e16184a39eabbdfc9a9ba1d4fa05ba9b54a5fafb61721d4e37b2
-
SSDEEP
24576:YQ7AJBnRkiJaH+jkYkhAmOehoI8mFSI86Oet6/Jete4etU:xYeN+4AghZTUEk1u
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2984 b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SouGoo.ime b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe File created C:\Windows\SysWOW64\Hook.dll b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 4976 msedge.exe 4976 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2984 b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe 2984 b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1660 2984 b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe 93 PID 2984 wrote to memory of 1660 2984 b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe 93 PID 2984 wrote to memory of 1660 2984 b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe 93 PID 4088 wrote to memory of 4976 4088 explorer.exe 95 PID 4088 wrote to memory of 4976 4088 explorer.exe 95 PID 4976 wrote to memory of 1096 4976 msedge.exe 97 PID 4976 wrote to memory of 1096 4976 msedge.exe 97 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1852 4976 msedge.exe 98 PID 4976 wrote to memory of 1632 4976 msedge.exe 99 PID 4976 wrote to memory of 1632 4976 msedge.exe 99 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100 PID 4976 wrote to memory of 4704 4976 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b164ab425c6da0f65f183b1ad24d1974_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\explorer.exeexplorer http://www.dandanwg.com2⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.dandanwg.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa1f8a46f8,0x7ffa1f8a4708,0x7ffa1f8a47183⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:23⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:83⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:13⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:83⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:13⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:13⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:13⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:13⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:13⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:13⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1076 /prefetch:13⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14514929705348859053,15812685527961969460,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3620 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5b0628c1fe523bc299c342d22d32c045d
SHA106276fdb757bb4baa1e28729d471b2cc823d452e
SHA2564bb22de45b708e798a489698e8c769ef32913a4aff15e91bc2cbde4928bec05f
SHA512f996f5812e5a030fe64763688841de733c92fec1a772752d522acf14a5969777f85ceccf306f577e89571bfe83964424f96e435d8650442b4a61362f60adfaee
-
Filesize
6KB
MD58e7c7f8752bba46e95acfacfb73ff7d0
SHA15155726d59e82f642bc611135ea6caa55c963f25
SHA25635320dbf978db94516313c3fcda169594deab5ab07aadbbd559016cdb4fd3f58
SHA512ae3576cbcc5003d471e8c55475bf79a0d7fbf4a790d8e67dd0583fcddba2721326be8b22d8d63d621de5596b63287c89148f60cda2791dc738dbf3b039ddf2b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54f6fd0fb0419bb4e84825ee18b51457f
SHA146ac6b29ee5cff3c588a77d4730eb92a728905b5
SHA2568f26341cdee7914146c2b63257e9de83f57a7d7338999d1fda25cdb82d26b16e
SHA512d8727b32f14fc7624887f7abf68bcb2fe449e2dd94128c46a7d77aa70763938848e5f80ef535e5170ca752bc9b540623578998fd6c66de730ad9408ad9d2b886
-
Filesize
52KB
MD5b60da4e2e5aceba3ce3d87ee2cd872ee
SHA19bbdbf1f3ce2c000a86e0473da756a4b1031db41
SHA256b581fcc82c0462d60286a80912ab2ce5aca7d7b11c5cff0b5f74716dbb7dc453
SHA512664d6f893484252b339ff8f413a4cf9da9b0ef82ed74b097ba86a5f00b4d9740eef6e8a5b81e8be7e82ae4009928097baf15e65a03f31c4b92e44f593ce39874