Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
d6ae3c916a97381c1ac350977f7f98cc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6ae3c916a97381c1ac350977f7f98cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6ae3c916a97381c1ac350977f7f98cc_JaffaCakes118.html
-
Size
57KB
-
MD5
d6ae3c916a97381c1ac350977f7f98cc
-
SHA1
d3e4ef56a4ecfe874377e3714dbfc279c97f305a
-
SHA256
1a9585666f822643d9942bf4a046ce8de7bc4319cedaa54806b231bd24709a69
-
SHA512
d4779076c686d2497cf5ea9e2811c9236fb3c5da10ce943201a561a69427fa898d8518b0ac479b7c57addb9b75a994574a2dbdd691d39cebae3c8963f5b936f3
-
SSDEEP
1536:ijEQvK8OPHdygRo2vgyHJv0owbd6zKD6CDK2RVrof+wpDK2RVy:ijnOPHdyb2vgyHJutDK2RVrof+wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 928 msedge.exe 928 msedge.exe 2008 msedge.exe 2008 msedge.exe 2676 identity_helper.exe 2676 identity_helper.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe 5564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe 2008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4512 2008 msedge.exe 83 PID 2008 wrote to memory of 4512 2008 msedge.exe 83 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 4140 2008 msedge.exe 84 PID 2008 wrote to memory of 928 2008 msedge.exe 85 PID 2008 wrote to memory of 928 2008 msedge.exe 85 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86 PID 2008 wrote to memory of 1464 2008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6ae3c916a97381c1ac350977f7f98cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb96746f8,0x7ffcb9674708,0x7ffcb96747182⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2768 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7771711188780934513,9279133612641812895,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD501db7e7aa526827429c549e23cf86efb
SHA1c79fec5b811978b1076616042063bc6b00ef9887
SHA256b2dcff00a04c3557ccbccdca9d438216ab369a2f9d9b2d3cfcfe64dc28d32289
SHA512afac222b117fc66a143577d6b353a1e736a204f5086823cb882fb5202bf2e2203d5e9f509b3bf7142be204dea736327b6a1234762cf3d7c1083fc6060428cb48
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD5745d6cc2f38d617ae1acc1d81f861ee4
SHA134b69652490e9f1642dc27e787ff085919b4ac55
SHA25657da1dbe84fee9572f912cb55675aaa23c2f9fc033be54642e7ffac518e9eb99
SHA512e1f558511639a9c15a42b4b7535afc173c3a50fbdd8591e2562f40cbb5a0ac226771add5f2bbc01e6d40dd504ad8c5bf2ac3897d021e3513a227f93ee663eba7
-
Filesize
1KB
MD547be7e1b5e8d8451c63a2f171cb41f9b
SHA115d733ed1cb60ed76c6d7cc23016c9b41110f0b2
SHA2569716a1a828ef58225477eb13db85cdf2e27e7fd67e88b9e6c7098ad75d6156ad
SHA5126e9f7161637fba990dd24a9f2824023c021a81af008631939ba891b1d740befe913a6c9482a760dbc8f59079f03b85721ba6b73100caa2eece8cc103a71a5a9a
-
Filesize
5KB
MD51ec19150124f3d90a8eb77a34c7e2a17
SHA15b9fc6dab912b51ce83981368d1825333217e658
SHA256b8de994eee37373602aba380618e43ac2c7fa3f460f1a1c09256a9f91b8e67bc
SHA512c13e8b7fa3404c98824b5b367491e6fc23dddf49c5ad88122b500775b030cb9bdd280f2fdebdf0b2416a39481b0c82dff8da31a151fb2bc73941af60ae038ae3
-
Filesize
6KB
MD5ebbba5b35fbc00cdf18d2171e8befa90
SHA172f34a56fc9101dc1ed061c0599352958ba7cccc
SHA256911fb691ee736a9ec505c652d86636a4368d1e000a744aef6ab41b7b5b2aa98a
SHA512cd9fcc2250e9929c90726f5b7899d5902d7760e44ef17ea0a4baf7493aebdec586be9ba7a4354f6d7394711215cd6dbd3ad7f3b8838540ddeefaa9982d0e9daf
-
Filesize
6KB
MD5ac7b5f13e0adf440ec020a1bd48be26b
SHA14f8172c3cec7188ad54dca3524db2c5a82f68fa5
SHA256709b189cd1cbb661d60fa875bc3fc14f221315687beefe1574421d28652275ad
SHA5127bb35808984a5bd710c076b169b93080ac755504e9630a59a7a48e37d9113f651a0b035da48555b8d31b2a087c8a0897e2644f780f3e7baa8b4e80cc4ee7cfb6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c69cd262b259ce84fc72a497aa394d1a
SHA10a82fb746d70537ba391a1d6cb08c0b19587b430
SHA25650141a18a722b52c59719d9abdc919392baa5a65382b0abee5bb30fb02bc9b00
SHA512f92189918c22370259506f280eb1526718de9e8d8c2c5869e734bfbe81b3e6c2fc93f6a8ef1debf7d7f50e79a45692a4d0dc6bdab8ca6d1297c040fa1197ab19