Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
26ea858b39d6c95d74bb8d6b9f7bd34f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
26ea858b39d6c95d74bb8d6b9f7bd34f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
26ea858b39d6c95d74bb8d6b9f7bd34f_JaffaCakes118.html
-
Size
175KB
-
MD5
26ea858b39d6c95d74bb8d6b9f7bd34f
-
SHA1
6ffe81a12d4f1e7a1740a12e8294ee0a79863849
-
SHA256
a44d985877fefce022f2b4c6de89c8bb94ec9000333499e597f713ddd41f70dc
-
SHA512
53f533733ec6f31be37bd82265cbafefb467e20c64399a0a6d3f1a76f236db3defd81323e28ec15c4265cc4a4d5a7e35f5b63335609338a3f5ffe00d5f12b77f
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS36GNkF6YfBCJiZm+aeTH+WK/Lf1/hpnVSV:S9CT36/F7BCJiVB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 4720 msedge.exe 4720 msedge.exe 2068 identity_helper.exe 2068 identity_helper.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3092 4720 msedge.exe 80 PID 4720 wrote to memory of 3092 4720 msedge.exe 80 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 912 4720 msedge.exe 82 PID 4720 wrote to memory of 3492 4720 msedge.exe 83 PID 4720 wrote to memory of 3492 4720 msedge.exe 83 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84 PID 4720 wrote to memory of 3712 4720 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\26ea858b39d6c95d74bb8d6b9f7bd34f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc6df46f8,0x7ffdc6df4708,0x7ffdc6df47182⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14748384362590743487,13705007824155346349,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5a02b9289cb6ce59d0ced8760fca49e0a
SHA161ca43f34b086b67decb39513d6cd7555c9593f3
SHA2560af77e11e7a39f4caff8e2fcf81cf2f7c35f1df43ddd29d49d7a2541b22a1f13
SHA512995524bd2c88daba4802c58387d78755735b4f3e8f212a297ebf8cc0bec9bba3f63ceb3c0d60426ba50e90d31f40f87326f1a71df706c5dae1352e0368157e1f
-
Filesize
2KB
MD515fb0e21532e34bd70012b9bc4326992
SHA105ba2a2449057559a829ad1a8ffef10844a6a933
SHA256fc0c69dade0b78cfafea95eaf977c9c9f624c1f05ac09581431652c3f1c8c243
SHA51236f5f929cead25c36fe0c2074c817966215cfe7a3cd84fa9f29d7e148a284db2f4b6818065ce4be3a5e019953b0896656c713271584e377e0344200f8cac44c3
-
Filesize
2KB
MD5281d6435460e38a64cbc36bd938dd04d
SHA1c29cf8066e7f9bf3d3bebdf84b2e998d5a18b8ef
SHA256129605280ecc914a2b285852d764ab9141921a19bbe3323c605a9b2c4b8479f3
SHA512e50e01e78327711d14d10fea967b691b80ed84652e84f35f77fb0f5df469524b56eeff95ab2fde70ef3b4fca8eb1f212847dab67aa71f6512e386ed83846e892
-
Filesize
7KB
MD5b70fe564356060310189030049f9765e
SHA1bb83d360852bf76266fd6b6a84a5711ba7f2dfc7
SHA256ea02764be75651a53c8a139a547b3f5bb294d1a6ff6fda6571f1c504ec4aa307
SHA51214772f89ec65cefc62fab84c1a79ad927006b3a6044832d6603fb87fec4b46292263f8014e908e7ba5ca5ad712b0c4e5d4ab0fc930e03a5e7d2e1b0525b8ea83
-
Filesize
6KB
MD5fb5b3a5013236d8a1068f134cff0788a
SHA16149df8ae379a96dcca31b68fa82419364fff07f
SHA25685fc9ca00beccb3399adbe1ec9d97330f1a4159aa336bc1089fcf3a0ddadd123
SHA512d4fce8a9c11e642a918b9bf898e2878666c3ae6940b4301683cb90ff569e449fd6a26b6a067c04bac8cb0c9f4d5f4cc3f9e560ac6c26d455a54420bbadaf8299
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58fe8f36ccb26d57e525af921b81a8044
SHA1407c1188d301e5b95afcd70958ce74c509533cc5
SHA256c840b7d6b6c743d04cca4f6e7ebbf11cac17399b37e25708cc1ab523bfbc2c3f
SHA51208f35823c2034c3c85300ca468687a8d5fe1bac69276ad8c06f0c68b04ef7416b25abe88319acb2d50121f29a9e9b58bc808b7797009a2cbdf08eace6f0b6540