Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
ecb6d70906741eebbb8be9b567e74848_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ecb6d70906741eebbb8be9b567e74848_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ecb6d70906741eebbb8be9b567e74848_JaffaCakes118.html
-
Size
430B
-
MD5
ecb6d70906741eebbb8be9b567e74848
-
SHA1
d0677aa8c8f61397e42814c97eb442f54f43f2ce
-
SHA256
ccf4de1568b4ab4d902a8b8cf29229db9d5cd700cb6607e59e4294dd2739b8d8
-
SHA512
dd1bbcedffe8e9a0ee3bea09092e7d69279b3adf3f2b60a6f16949018806b3ea1480c913c02576a9266310f3574bb5a4457db22044d38a9afe828735fddd6b14
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 2308 msedge.exe 2308 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 5088 2308 msedge.exe 84 PID 2308 wrote to memory of 5088 2308 msedge.exe 84 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 4492 2308 msedge.exe 85 PID 2308 wrote to memory of 1948 2308 msedge.exe 86 PID 2308 wrote to memory of 1948 2308 msedge.exe 86 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87 PID 2308 wrote to memory of 2068 2308 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ecb6d70906741eebbb8be9b567e74848_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd7c246f8,0x7ffcd7c24708,0x7ffcd7c247182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3612504590709496233,17040312362661501087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8ea72a17-fb74-41d1-8f28-cd3335ec0abe.tmp
Filesize6KB
MD5df4d739e97f6890c6ad4a3ce40c2143c
SHA12521a83e69f9c90f3330896960046f4ef16e43a2
SHA2563f27c90ca82739206e4aca81d58bea9e98c5509c526afccb5272394e5413609c
SHA5120edbf337a2070cdf4a0e2d662feac1c3af1d0e5b6de837ff4d8df87f1b98d36af9d81defb6557f077ee6f6cf67071e3f22ecc75872e8efcd18571e4ab84e76b4
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
7KB
MD55ec5d66eb8b545d728005f86b624844b
SHA1e9416692b6fb114177a1372f57ac78fb4f621c32
SHA2562d6b468ef0b54d66595c6818d5e93abc84793f6c9573d3c5f20ad96ddc38d75f
SHA5124e1da8d74fce5642667642af2b8f7dd44743b096822d1576dbe7535b6bc3138b5502e50784f8d98a6a06ee0374cc6da434b21c6c463975a94c9f8448d9515cbd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d3f3a752a9218b1efa475da8a663b0dc
SHA116fcdbffcf37dd04f7f95112221027f354802392
SHA2567ff07d1af60a30bce2537d0a334e2dd6abcfe6d1f6f7566d3514e02d4a8cf631
SHA5121c0e8c7da025a8015bd3fd0f1dc7aefea988d21f604a0ea0f2b70ee9071755e8e8d164e0aeb89660d14c2731cba7933d172210e721ce886c57ed4914d33375d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5795f6.TMP
Filesize48B
MD5d03f1ea81dd76d1e6e678d34ee5d97ca
SHA1d05f9ecdde5c8ca6d448e7226794905a1849b3a0
SHA25622a8f36d820d387e4ee221112e8008f79b91cfacfec7356727cba53ec3e0375d
SHA512915b6089722f5cc3b2f94b29ed81b2c564a85f7d6937022045290dea78eff0a746d9df93069baf691f2c28a01bd67a548d7502d667f0701f62d43d00c7eba429
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52eb980357d9a2e93ffe1ce82bfa45d7f
SHA1086369cc5905fec4799dc21c8e6a7ede9e010786
SHA256df384dd50273e464b33c10b8c20a65cebd470bc14326dcd79e9ae16c6ed5e1f5
SHA5128bf252de89c5441223cc94c1a3e42d4fb1ec5ca0f26a00c29960a4282439ae8db7379ee9deec27a73cd40b2b793193baf4d2b6ed92e56a244cb30890c46a99d1
-
Filesize
11KB
MD579d206ada11fb80d52b818ead3a7a77b
SHA1e8118b06a23f761581c928aa3b704f7db35ff64c
SHA2567c7ef83c9d898eb5904c51e92f38addf0ce6da2df307234ffa8a5ff2310c11a2
SHA512cc5093b87bdc106980a2a5065e32e83c796cffcbf4f24dadddb9b67904247f5cc437b6b72064bbba1fceab9df5a0d9d3ae2d3d8d5f76944608fe822cc053234b