Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html
-
Size
68KB
-
MD5
7e35a7a1fd8f43c53a4c7e0e62432a8f
-
SHA1
5e784dade2831d3a0cc0cf9506914ccb539b1ddf
-
SHA256
e16d52b06e547af2ea095c3a1b19f24dbc20b004b07152379b664938a91b7477
-
SHA512
70a1b8f2122143b1a2d90c62108178354c453a9e2547b609f03065eb9c14a33b0c5e20067eec5f8ddc65e40b6f4065be0c7ab5a4c8bc20f7586a3f07a5f59ca2
-
SSDEEP
768:PRwS5y5TlpjP518KodSh7AMP0ZnjcJmhodShLaFQ0H+iwwntlkd:5v8JlpLVodShRsodSh+Y/StlY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 872 msedge.exe 872 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 3612 872 msedge.exe 84 PID 872 wrote to memory of 3612 872 msedge.exe 84 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 1936 872 msedge.exe 85 PID 872 wrote to memory of 2292 872 msedge.exe 86 PID 872 wrote to memory of 2292 872 msedge.exe 86 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87 PID 872 wrote to memory of 2460 872 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7e35a7a1fd8f43c53a4c7e0e62432a8f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcad9f46f8,0x7ffcad9f4708,0x7ffcad9f47182⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6907699547303272739,6206548267497806959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
20KB
MD505197e9427acea2ac4dc812f97a8f078
SHA13d2a38b79da52e57783360f195ac3e7c85edefd8
SHA2567bdfd36b4f017340dbc84a310014381bfd3028416ff21c54f7ce0a35cfd38191
SHA512084d4febc28358d3ba6b0bef400f637b7f350381b8b592b1e412dd860d5aaf034c03ecfa87a064cb19dd8a42faade23c260e35a8660791011b7e51b726418ead
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD534f4e1aab26eced6c6719b84f8bc8bce
SHA1a69b713d8aeee78a72d0b355ba00ad897baecc31
SHA256cd9f8c6ad7cf0425f0b757c1f422a751f0a0cc4f88294eef28e4ca4ee79486ec
SHA5124b26ae628647a70bff5b82e408a5c978c9b351a9fc2d6c48915942a57295c7f6700c0891ea6c1b5163043f29f268c55bce9e6323212de871b0a64984e3f8d552
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5cca31033f3760ff0b54835bbb56906b4
SHA116d4f4d81ad2898839bb03a443586403d6c39098
SHA2566dfb0c5e8942db06e61482bd20da63de2096f5fa0e97a280f0a1214b38c9dbdb
SHA5127d7bcff332b1a5d87fc369d46622f7ab3d30117935dd36466e2c9fc2eeeaeb75cd0256e9fd69eb8ab9f1947ae22b7880842dd6bd8658a106f44b660f4f69ab7f
-
Filesize
1KB
MD5ec9a9953524254ada15e64affe95eae2
SHA10004eda753d7245badf212ac00092d398b694149
SHA256cbc08d1beaabc1608097c12ac4cf697be5456c9d9267483c064aa6dfa1c06043
SHA5128c6903dd55a53ffd60b875788d4a5ea3fa524482739bd8e432d654267e4423aeb6faed2e6536ae0198180395cb4717807b906baf3fe0cc22490ce2ad12e58eb6
-
Filesize
5KB
MD5c2cb98290308b4f87f7d073339b7a02e
SHA1990217d72b15bac797a85889cb7e6ac6e110ded1
SHA256c93cb6d18b4f77afec07ddf072db40c5f80e854a9f580b3cf8847574e0b57377
SHA51296d1c04930c5b5075d4c39f10ca66463c1888793c9a26b1d3a49e675136473ec70eec7ce340828be29dffece654b30a0735a66dac86136a3a3026f90bce916f0
-
Filesize
6KB
MD51c081dde3eebcea7d0af2c912ad3d7e0
SHA1640c35c01c89425d07fc06baf0d631b470523846
SHA25684710b7865f21f5e821a88e3a6a8e167b154f0bc6daaf863ee9daaf24509ffa2
SHA512ab768871542cf0e9621050367eb3cc4c1a4cabb4f2be35698619f3c1f4d5b99e17d7c5aadafb70d0047dd2ee4498239ede677d1201ea211ab35372ec3f7b673b
-
Filesize
7KB
MD5fdf0ada572b1e63ca77d2c1f48a1fc8c
SHA1afd0cc1dce4f3011504d347efdd77ef8518a954e
SHA256c77247291f68dab15e51e62bba0cd4eb5acbf55879f1a95237d408b7add5f7eb
SHA512e66ee73b8227b4924b63167dbee7bab435c265d8addffba656ca8ac06dac48d828c11bc13f3e83cc121e463e2784582f7b6a6aa83f1945b08a5aa4a277e1ecfa
-
Filesize
7KB
MD5d288854ecbc6098ba25515fa68b62a7a
SHA10acef243f1a0657bf0c2580e47dea02edcc5c483
SHA2560ce4c20b185f73a80502047ad2170a681eb7a234ab51b3aa012bce3fbab4b3bc
SHA512eddd73d94c7403b80026b40db8617bd4f2c815cd106828a0445b939dc6af656201f6ef42dbf3ef0ea366dda3e8556021a8891b053f39e9293baebaf2b4fe3011
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD523aa14d0f8a07734f4e439c8ee035a38
SHA1e5e882f11019650e884b9a72feb8adf6e9ec018f
SHA2565a0b6205b7911fc52cd2c7ad777052e38c9421fd267f0a1c79a828eae0da3d3a
SHA512392de64d229d3ee2f91a0ac5f6d69cf104bc951c0690d2275e6fe4c055b514e7cfc927b65a35a6ff443cee44baffc8bce320c7906792e832c6091cffb3517a52