Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
4edbf1799a88ffa893f3aa077b0348d5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4edbf1799a88ffa893f3aa077b0348d5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4edbf1799a88ffa893f3aa077b0348d5_JaffaCakes118.html
-
Size
88KB
-
MD5
4edbf1799a88ffa893f3aa077b0348d5
-
SHA1
b1652c2c7894f7f751736a41223923574d14b1ce
-
SHA256
b496921ff37def40fc3dc68626a000a023f4efec3c897cdbc3c8c5ceb140ce72
-
SHA512
bf78a84e76f185ad3b07143f0b9182b72b01e7fc56ce2adf5ae9916b82c3b03671a22ceaf330b4e2ea17b405ef15d109b1790d4e053d8e002c5cc261ed7129ea
-
SSDEEP
1536:SHBEyRxugOruO6Gwu9XBTw+BPoNb96Oe9DZaMkvww26rHnmq:SHBEyRxuHa+BPoqD02Ej
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 1840 msedge.exe 1840 msedge.exe 3712 identity_helper.exe 3712 identity_helper.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4768 1840 msedge.exe 82 PID 1840 wrote to memory of 4768 1840 msedge.exe 82 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 740 1840 msedge.exe 83 PID 1840 wrote to memory of 3672 1840 msedge.exe 84 PID 1840 wrote to memory of 3672 1840 msedge.exe 84 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85 PID 1840 wrote to memory of 3320 1840 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4edbf1799a88ffa893f3aa077b0348d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf8b746f8,0x7ffaf8b74708,0x7ffaf8b747182⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,7006580599987365493,14212100594235563245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c937a9a7fbb87cef0d927a7773f3d783
SHA1faca3bd1363f9e347aeeb37299b3155e56bd3dbd
SHA256a133a08927eb8bac3cdff7ac937ab0fb154d0fa54c582145be6defb1dea65b26
SHA5128fc908520bd007fe6aef7ef1e1a55a7346cd270b46d42c45918ed10a21908e707e08b97ec2b9f93d566fc179c137ea6e793446c1af90087fbdf4d9e3f19f87de
-
Filesize
866B
MD5ea1392c6cd0ef2fb2535788081a262ba
SHA153d4043f6e709b51fe9840cfe9198173ae99aa47
SHA256e16b85b2de35437b466e18a53525cf6a0a37a2ad1526cebe8a7e5508749776f9
SHA512592fe9514d95ab29e2db4244c98ad341baeb6c8f5a476dafad731a513656205898ebff1ba74555be46ca1ed4f2eff2289812e4204d97138960b7c88771395d7d
-
Filesize
1KB
MD56e0c5f1649d1722f238106322339178a
SHA1e0039007136155e8f81cef55c957359a530e9264
SHA256f3e58028ec5f248cd3d10f9871c891ab3d5482689adf9488499d190cff0be110
SHA5123ffe7d534c3e60dcc839c2f700e766d61cd285bb00053600fe5b37862ed2f2054899750efea7cf106cc239211a61b246e4988adb8eb4d761a7d070f26f63ecd2
-
Filesize
5KB
MD59c8f020be143b935376c312add0af8ae
SHA1191ab0a8634973036f85e933f13e34c2ae022d83
SHA256bced92707899b4cb4e75e95aa153ea9125ec96860796427bb91c011711f43183
SHA512846c2ad3efae88e2a008b121d5f57eb67be96b90ccefc5351715dfb08b8790fdd1f1e49db082b588847feeefb3414b7e69c886ad3dbaf54a58d7e533267b9408
-
Filesize
6KB
MD55595bce1012ca10b33df5eaccb150d8d
SHA1666e8663f670fec1026594b6b200e184e7ae9106
SHA25610b7770137cf2c4b2b691b6a12a5e50d460baf26111e953fb4c9ff5243460f1c
SHA51220c44c7f92932754b923a6ad97bf73ec7569ccb6e1dbe987fd3af8e12a1d3ec0ddc04e5a4f1e54a20980df9587c7c253305ed9e78add6b74dd2b95b5bfee4040
-
Filesize
6KB
MD530658c96995d29cf2ec7c1dc7f36dd46
SHA14a4a0f9a3c31d02edf17e9fbdd93d783f236888c
SHA256bf41f25389a0bb2146e58b937173bdc165a6c851bf3eab8595947add40b0949c
SHA5122ad4e65723edcc3a65651bd22deefae5530a26e29f341d0ec4e5cca90b275d10c8f9606f553dae56eca91ff117d9c66de53fa30b751f028a2a0da302f5186483
-
Filesize
372B
MD5f2993ccbd299afd311e981e86f1d47ba
SHA14fca474f5b592492513d3d569c44e5d824f3ead3
SHA256969a6a85bdd14ae2770a5917bc9624cd07630ae3f7dc91db944a70675086cc80
SHA512cb06fbfc69159b1132d75d49483c88e9b665026eb0c2c2b9f86a8f7102cdb52744696e32297ecdfea5b2227249b996b0b26a7e7a15cd90e65490df6e6b73d778
-
Filesize
372B
MD51365f4d75cb96bf59f439d55af4f3f8c
SHA15d1efd5f54c558e1069eb23bec96abca007fcf91
SHA2563c93c32175d3d974be0038e5578539e9551010b761a034b6a0c93788d4b35f18
SHA512d13e33b0172593d074a370648b2aae151f3273fdbf29cda19642fceff9688a9d3bd603dc7bef2c9d97cfcd1e097fe91a924494f1a948dadfc7f52cd79159f62b
-
Filesize
372B
MD51a5708c342f8b75df644e3bd753494e3
SHA1b452034ba2de705117db4472434933f482929405
SHA256acf962e1968e6044760a0eada6c22a955af0feb1cf6a4d2d578cebe54b9213bf
SHA512621ef32cd5380718d6906e763aeea8c6d19dd865ac7add4dceb31e088ceaab14947630edc1ed3fe257b34493f31f368a51ef8e8aa7ec27e7165653772186ddb8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD554859390b3c06413b127512a05a79408
SHA1cee6a5b904e266ff9105da527191a11e00c43e36
SHA256a5a1ddc8b48789518767ea78472e00a2fdd58569224e6884b950d2e4fad0395f
SHA5123c5ead4e0d275262c018052390992777abdccedd9a94cb8452d33144843dfac94a2ab6d70b80bd7e22336087a7edcc155a8d3a4e8a73b141710ce81d2472f8c3