Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
38d29acdcfb0eb891b9c6d500c32fa1e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
38d29acdcfb0eb891b9c6d500c32fa1e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
38d29acdcfb0eb891b9c6d500c32fa1e_JaffaCakes118.html
-
Size
171KB
-
MD5
38d29acdcfb0eb891b9c6d500c32fa1e
-
SHA1
4456cea157c2d23ace537880845960b45dc60fd4
-
SHA256
5c0e8e470c7eaba7f9c41940bddcae1ff068267cf1a05f62b590c486677d9b2c
-
SHA512
866830ac084407f846212144d4b24a9948379ddff529c7faf17dc2a113dae2ac82f193821a2bbedc16e1cfe73a182309d1b1dccc203a58e8af833708a2920086
-
SSDEEP
3072:nwbmcAHLUVbI7L7koFK5TafyoTHj8W9DomfGFjLt2jdpCIQKtWlkeNVMs8sMyKM5:nwiKvYyMomfGFSpCKyhKM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 380 msedge.exe 380 msedge.exe 2100 identity_helper.exe 2100 identity_helper.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe 1648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 380 wrote to memory of 4016 380 msedge.exe 83 PID 380 wrote to memory of 4016 380 msedge.exe 83 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1672 380 msedge.exe 84 PID 380 wrote to memory of 1428 380 msedge.exe 85 PID 380 wrote to memory of 1428 380 msedge.exe 85 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86 PID 380 wrote to memory of 3500 380 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38d29acdcfb0eb891b9c6d500c32fa1e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5c0e46f8,0x7ffa5c0e4708,0x7ffa5c0e47182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:82⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,4123077543648450279,9776407848047963709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5f99f6cfe79b8dabc162be03f5559e6af
SHA1ee138b665811e79af36ec3adfc798afc6e8ec223
SHA256f3c030e0847babcb2d9a848de240be73fec03d8600a2fb1873369c7652fb376d
SHA5122b6c7f5a922318d46242cc51651d6eced6c1a95ff0c82703d39d968a4a1237f549d904a5ea18ff8a41f238686125f3781f9550a24baff0e9c0df35992a0249a3
-
Filesize
1KB
MD57551e11c9df91c81e946b1341685dce0
SHA1a5ef3bb2626bd13bbb79696e19c82ac84ee3303f
SHA256e942e7a39fd48257d6eff5e90de8d9a421447af935fa950fc4842f2807a9cfde
SHA512d59b393d60c5a18dec493d96f42d16c3edabafa06fc49b7733e42e157886e8f62e0be3960eae964daf58efaefd80f97e27ebd060c607de257855dff5eb2ded3d
-
Filesize
6KB
MD5ac4d5c8eff3702318e20fbcae7d4ffe7
SHA17e2068e71c5fecac7e086cb0acea8a6bd71aa8e4
SHA256bdc7b98b50c6cca8d1092a89124346a27cb8dbb23d9455b82b0f9703df3f4869
SHA5122632a8bc71e7261a41e45fb345bac3fabcd1d921cb63c5e66534895332ffaa34b9701acdda5f8c8bf6a56aea81aaa0eb0a9ac58f7a3ec7ab89e36655fefa8ed1
-
Filesize
7KB
MD500dae6d012c4740e97697f1297196acd
SHA1bc7bfc75732e37330ab37bde83ce3839181687c9
SHA256f02e9066cddb247013318f2279bb87425136a7b3a5a017a0cd3ceb32a8a8d2cd
SHA512aabf8abe4af1cec55674990cab3157ff483b20cae0f1da90ac4c9829e4daa111afec36074aa7b3e529a23f96bbd830960803c4321b49f272a0318e423003a0da
-
Filesize
7KB
MD5775431760bbecb4b3119a932544f1a55
SHA191230095805cfcc0eb481eb7c791f880683148fa
SHA2569a6fdd571ecc47895d8386347a768677e68c8b7efe17eb1f12552d438d97baf9
SHA5123d1b7d2de2f44477cba1f3d08967ae6b92bfd7128c892c20f2a8406643393a956453f4cdd732eb466ba9e64285384eea196b350fd4bc0fbffc987feb21b40d85
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5aafcd8426a96c0000e95cbc8eb0394ad
SHA169840cbddde5d8a0dda3162ab22285350c98f1ee
SHA256463009d19c43439577f3f4c3bfbffc551fd3cb454b78a9c52fc089ca917c31ab
SHA5121f85b16f628210b84632e0a4a1e1cea5d05878187d77d0e1c4aa1285096671aa0a0a2ccac61d678dd05278608d434f4cba073c3acc2d7b1b4c3974785d94c8cd