Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
46639eb91e7cc25d23c8f29953e62534_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46639eb91e7cc25d23c8f29953e62534_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
46639eb91e7cc25d23c8f29953e62534_JaffaCakes118.html
-
Size
129KB
-
MD5
46639eb91e7cc25d23c8f29953e62534
-
SHA1
6408cde317aafad223e233a05c54e7e6fa5a0d9e
-
SHA256
c9c5b125e22e333af4cd62f35161ceace10c44e6b252386f2a7474243c5f3fab
-
SHA512
10bbe82f69bffee007e3bf44b125efd38bbab6282639e44a23ba0117d1c4a087848f37fc3b3318877386b0da2c2a240d69e73e87356ca0dfe2a37f40539a1e7b
-
SSDEEP
1536:mkSWJZZvulUJy4d+7iiNu4Be/zEO2sPe/zWup/Md6P9/4OsFo6hK7ZBAQ2:nSWZZvCUJy4d+7iiNu46S6hKa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 5112 msedge.exe 5112 msedge.exe 1448 identity_helper.exe 1448 identity_helper.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe 3772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 2648 5112 msedge.exe 82 PID 5112 wrote to memory of 2648 5112 msedge.exe 82 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 1168 5112 msedge.exe 83 PID 5112 wrote to memory of 4456 5112 msedge.exe 84 PID 5112 wrote to memory of 4456 5112 msedge.exe 84 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85 PID 5112 wrote to memory of 3160 5112 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46639eb91e7cc25d23c8f29953e62534_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6268 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5145318589130211389,11476593653216821811,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD560d440e54d565dd9ac3e0cc388d181d8
SHA1d195dbf7dcff0ad2c192f3b1b76f1200251a7bc9
SHA256b5dd70f82ce0ba6695c93fdbbd752bd4aeb1b9f649dfdff0900ea587145f295f
SHA512a73381f08580b1cec53d03a3009ba31f6c7fd8ed9727261173c643693b0941b5ca95b5107b3934e23ac0dfb8b04fef970b6cc4cc785b10bf2c0f851a57d91a4a
-
Filesize
3KB
MD5f1aa57519158dfcbebf00224c9ca92cb
SHA15f9f488c89760c2654c452b0299c2eac879f8f59
SHA256c57d474904dc5464e3a9fce3d5cacd94b2f66e0f2c5eedbe8b97c447f4740672
SHA5129fe559a07d1646047e998903c5e3d1ad001e30dfca01d3aa22992b60f3414cd0612f71473b36a0c1f9e4304f818c7418a33fe946c2bdeb6d35e871e13ac20a4e
-
Filesize
3KB
MD5296600f676cbd6cb05c8c7b6c72e5ffc
SHA1a0dccbe273284f0be047bcb397ba1f8b29450b37
SHA2568aa39e32ed0648d71437284660c360578fe98bf38fe25c208d77474d8c622de6
SHA512b072b2ab1e8bf06c8fb35d6f31a70246dd946c107fb8155c38589d368cce3882c172a8dd5896b8c3bd20f46f68b58f9422fb2343d6c30038ec767941c786c0e7
-
Filesize
6KB
MD541e26aa49c9ad0917e1ac4e72e1b01c6
SHA1bf5f3609d6ad161c2cf716d5c0a087fafcaa1b90
SHA2568a8218492e34dd748c616f41d3c6f6ff68bdbc821ec1f88e6ba58ac09264235f
SHA5124fb6402480ebe418cd6ec12a7d08598143a6e846e6a6f40f75feaa8780e8f91a862bce2344386bd9df0aa4f5746b966b2c45f577b11bd3aeb881516187d459fd
-
Filesize
7KB
MD54ab2351793d2f12ae7b621d7757bcc87
SHA1eacf512e7924f20e637b439836ef0f76e7874057
SHA256ae7df40f14c288456f94f6953c9d58375da7c21b8f71a29e7d911e76dca9adb6
SHA512ec00a2b14cc86ec61f42dbbdf7f5248fd12aa57c7e3b72480412505148a0d96870a5b715d651885efabe6dbfdbe04d18ddc7f3cf416066224238b758a284b960
-
Filesize
7KB
MD5f179e7f822ea723d6872b4984e5974cf
SHA1bbe96471591f855f9761c0f29f767d00ba6815cc
SHA256e93e31920c0702d165f018be87a587a17b80f882d6d5d8eea6e66c0f83d1c8a9
SHA512381360f050402db39a6ccf8c2777dd665ecf115c88d4cae7b45fba101c767d2412cd7ee1388b89f201e2fda0e3f4579a4184cb91aaad96e8b5f16f0456222300
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e24568bdf130d50e5b690ca4f18dc6a7
SHA15fbd7b5e7bdf18bc9621ceac04b9d0313c2a9831
SHA256be1823ae273f10ada0d680586f58013b379e00d504d2a974058498f8bb81a814
SHA5125327d8c33bc5861bb740476632f11c3e233c53a804c78aa8c3bcbf23c3f8faf8a3950fec127b373781ac8c6d2506ce7ac0198e7dda871bd51aae981730797320