Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
ef638cbd15dd55335c4d4a6d2d96783d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef638cbd15dd55335c4d4a6d2d96783d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef638cbd15dd55335c4d4a6d2d96783d_JaffaCakes118.html
-
Size
73KB
-
MD5
ef638cbd15dd55335c4d4a6d2d96783d
-
SHA1
114bc643ab7d63677873337f2bf5142a82d1bc21
-
SHA256
53d744ff803a00f690e6b20d4cfb410331577cccda21f27803d782671f4331fb
-
SHA512
dc4eb513a042fe5f47e7f85be3acd67be3fad080364633b8c177690e58f0be1cd96b282d0ff82d515143fa6686350ddb9fcf4009f6a506c631b43c311ac61c8d
-
SSDEEP
1536:UZn4rNN+LBht6bJUDVmsy7ZhhjSm0JOltM6Me5gcX1yTWc8cio9xYJHJvJioiQef:UZn4rNNqBht6lUshmmiOlSFYRlM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4820 msedge.exe 4820 msedge.exe 1840 identity_helper.exe 1840 identity_helper.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe 6096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 4608 4820 msedge.exe 82 PID 4820 wrote to memory of 4608 4820 msedge.exe 82 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 2480 4820 msedge.exe 83 PID 4820 wrote to memory of 4868 4820 msedge.exe 84 PID 4820 wrote to memory of 4868 4820 msedge.exe 84 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85 PID 4820 wrote to memory of 4684 4820 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef638cbd15dd55335c4d4a6d2d96783d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd42d46f8,0x7ffbd42d4708,0x7ffbd42d47182⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6652 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,936566773732767693,2091779484348302093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD588bf45bb9e8509fc1e63468de415d427
SHA1fdc66667031f2367803f8c03988c6d3e493c3e0e
SHA25624291904f62f562ed864074bc82129cc430b0626835ae5d715c4e0ee9b31dfe6
SHA51223c8354bf82744eac2359b36d79fdec64dd206b3dc85a5c2f33f64f4d752b50c78a41cb572ddc991ac3a3449c93af7b20a556354c4900adbc33f33fc46656aa3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5135e3ea2df2329b113baa2ae5612274f
SHA17f008e35f72610218fe19a07a0a1dbfd270a4bcf
SHA2569eb5cccee4f2ab80c9ad2944c032d6be0111d3f87ba24bdbd8d3f19378c49612
SHA512cb63da22e1259268785e723eb80e4802db0cd483ce5a7ea7da48c11a02a48597661290f8d8499ccd5480e9ab607c5045a8494a4907c4bac8c8f8298d76298bed
-
Filesize
2KB
MD507ad0c1cc9794ff081c6af351632e5d2
SHA16633734cdf755dfd15356b4ba3160ef204faad00
SHA256e926d9b2709f1e4fe3ad554cb768744e93da1328a6996a48a719c8e3b03fb1b0
SHA5125929ec23b4ff12c48bc5cb08fb5ae29ac599bbb0668271846861b402c1e8bb654c5a14cb70c8fb004ee0a0ff366aa8e8baea276df1fe7a286b45c406b92059f4
-
Filesize
5KB
MD5f1f9afe033f5f905ff7711e7cf36063f
SHA1a57e9f3f1acc2b35d3772c6040f807e2ec509af0
SHA25651640de10252671a5927e7e4231a0c67d767443ffe9c28ad54d01d5529704fa4
SHA5127eee6032920bf9c53cee3731d747b266822ef974800cce5d17cbc08966b03f1ea847b91cef58a7cd4ae1fcd65915b8f745b98b0596c6d46ffac1bb8365244854
-
Filesize
7KB
MD5752962c811cfb6b273c095b4fa0e8f92
SHA15d865da847a781cf1a6610ecc3ed7dac088e747b
SHA256d507b572c45d3319db67ddfba35a73971e7549dd70350100e72c32fec6aaec5c
SHA5120cdf4dede9bb737530487dea0abd5e17d66dfed3d9643729ff0b311eda0c2642f32f91a93998beace072f2e6f15b9c6af443dd128af635d55fbad05f47df8a93
-
Filesize
7KB
MD5a13e50e83c4910fd9ce735cc2ab65437
SHA122dd3f30c48a050a226f22472690207cd7928319
SHA2569807d4a961ce2b565e6192fceb6f1481059e33d64ef24286371d6194df7fd66b
SHA51249895d8b94b623493df35f03ab426ee1e1d3d0ab92af2ccf14159559e82777b32c2550959d78c2f9f6ffd076eaf92c64ed3c0e67043a475228c858a997ac2a3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53d51e32bbc2e7105fe0473cbe0534b06
SHA1a294c4f7a3060d7e599830f9359cd9504e741daa
SHA256fc13d81719ddd7bc665fbc5623bf89a1f7d0416d67824dc96941572a2e55dd69
SHA512faed61deeb6deb260d55af3dbde1cca1c99366b8a3509dde80f81c4617d965693396e8b4f4a2ec8cd56103cf09ec3a12a0e2471e8e64834283cf8f1c2e705d65