Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
0c01700def554604ab786632ced1e0c4_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0c01700def554604ab786632ced1e0c4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0c01700def554604ab786632ced1e0c4_JaffaCakes118.html
-
Size
175KB
-
MD5
0c01700def554604ab786632ced1e0c4
-
SHA1
7abc8cc61a5d311012e45dc8c1264116897feaab
-
SHA256
12cfe6148ade7af16d849f9e7245be36cb0e3cdca3fbf84731a0ef7ccde856c2
-
SHA512
a53e6b9ba90b39e16d0fb27eae90001241d394537122efa0298fa42088fc26e13b17aacc6782ff2ae346a952c0ea3ea721c56c78358e94984d1444899d94e90d
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS3zGNkF5YfBCJisR+aeTH+WK/Lf1/hmnVSV:SBoT3z/FcBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1836 msedge.exe 1836 msedge.exe 3100 msedge.exe 3100 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3100 wrote to memory of 2156 3100 msedge.exe 82 PID 3100 wrote to memory of 2156 3100 msedge.exe 82 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 3816 3100 msedge.exe 83 PID 3100 wrote to memory of 1836 3100 msedge.exe 84 PID 3100 wrote to memory of 1836 3100 msedge.exe 84 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85 PID 3100 wrote to memory of 2476 3100 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c01700def554604ab786632ced1e0c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd073e46f8,0x7ffd073e4708,0x7ffd073e47182⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,17419692382060819296,5410604178909648498,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5b260706a3acef4303edda4a2dabe4862
SHA1b5c88281c40b64fa6bbd1f28e67b5466e0982663
SHA256d768daff893d9bd1a2cb0adb915c35c5c20f13c99aa33a33793b879a0d581947
SHA512c5723e8e2af35aef9e4d86b79371323821996367ac8e2c50f908f98a184b096aa42f0fe526189856d5e08bd27ab9b8b6d72f3bf5030048f66d30184e5259b5b1
-
Filesize
2KB
MD51e0a7467ea27c711c25891e6492fa915
SHA1ac0f490b3af843c0e7ffca3c14a4c0ad72f5614e
SHA2565ccb4bb829ad70826cf35a24e836bba5373261c1c4eabf4e45d08895d8264013
SHA512724f9bdebcda1fa9a8cbdf39dc6ab78aa5785212896a4443abf9b0f3f351a0006efc2c6fe15a0e0156defe07daaabc541e24837f5e928451286741727716af40
-
Filesize
2KB
MD5cfe90d21b2c2a7b60dfb7179bc67f36f
SHA11719bb3871f3d17451a1b8fc3f779d8b6673f7fa
SHA256f44218a66cc4e01d00ffbdeec0339199e6f45ccdd41e33e6b1cc0c125897e4ff
SHA512ba0e490a2044268b0e0e9ba43c65fd85f18664f03e61c45433c6fa574ca4c39d02bacac9df9c879a7999284aff7da19c85d6e604337987f2c446d0630a4c2b51
-
Filesize
7KB
MD5b39f7c815c756c29bebe4cc9e12b6f40
SHA1f8ada0d181e9f0554bdaeb8e3dc1e90ecd6d8009
SHA25632d7647b4517d619e72ac81c51dc9bb08ce702e32f962b6d08d7d1d4be6574c9
SHA512ec5d075fe03bb00eb0c57789b64208ca4ea56090ed523b551f56d4efb439ec5bee236be18d9246b05805c161f40fd113fc7008fd0e659b6a6eb0195994288c4d
-
Filesize
6KB
MD534f25ca0ec58efa67ab164058f5b3cfc
SHA1dbcee83dabe6485e278d26c2c5401f0f14c61ca4
SHA256f1665cc022aa1a36aec1beefb1f5ebd9d9f9bc890be4109b07f04cbc379a419b
SHA5124059fb31df150d837e6ec444a7cc2d3ad0f2d988f751f59fd88a8971aac9797399e196a3932b6af04fe4df39a8ebcef876012f0fcc3089b60980f941cfe7c1df
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD51c686dbf6b15ee16e6f3eb9a396ea3e2
SHA1c8aeac42316a31f482127fc4881a843dc986f92e
SHA256aefd6d5999d40d55c294b6940347fe36a07148e15555a4d8133621aae9a4644a
SHA512b20088ac0c4124f77efc769620816c6b173efee08eb8cf1982114b4a270ae667e62ba5ead5f19aaa0b23836a681dffff3217fd2bf2de8498436b4e219cdf15af