Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 03:08
Static task
static1
Behavioral task
behavioral1
Sample
5ce09440912b5a505070e070927e5d62_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5ce09440912b5a505070e070927e5d62_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5ce09440912b5a505070e070927e5d62_JaffaCakes118.html
-
Size
175KB
-
MD5
5ce09440912b5a505070e070927e5d62
-
SHA1
c0edd981a446ef4f1f84a78910e3c97961c10607
-
SHA256
caa351fd63ed94cd0ff6c0f3c798b292b33df2bda70f95c8c21d49f603cd845b
-
SHA512
0616d4a352d4ff375f85e62ad4033a6c77ae58c9f07f647f9467e3d86339a22e73b08ea967b379904f259ae21532a53e84bbb3ec477dad4e81d565bc8c8b7215
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3gGNkFAYfBCJis0+aeTH+WK/Lf1/hmnVSV:SOoT3g/F1BCJiCm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3700 msedge.exe 3700 msedge.exe 4424 identity_helper.exe 4424 identity_helper.exe 5692 msedge.exe 5692 msedge.exe 5692 msedge.exe 5692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 4816 3700 msedge.exe 83 PID 3700 wrote to memory of 4816 3700 msedge.exe 83 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 1300 3700 msedge.exe 84 PID 3700 wrote to memory of 3856 3700 msedge.exe 85 PID 3700 wrote to memory of 3856 3700 msedge.exe 85 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86 PID 3700 wrote to memory of 3000 3700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ce09440912b5a505070e070927e5d62_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff371246f8,0x7fff37124708,0x7fff371247182⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7330058087671994166,12821686788488520967,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d4a997662921ab40eb6f167eac2a8237
SHA1940175337e4b09344c9ea8bc07fcb89f1e1a20cd
SHA256e3df9bd9f1fa83a62d4f4c11fe9a9a1838f7fcd2d6ee9bb3b7bb94ca6f723169
SHA512478dcd216bbd714cc6589f2b149da8e1871d9da11db069153f77b71a70a8f7d58f75958f0f5cc60d71f4a478e49e3ae86268726959523d511f625b0d5fd1668c
-
Filesize
2KB
MD5317fd949d5cbc8f0be771310566364b3
SHA1e2ddbf1e8dbea944851cfda6f94150de9325159c
SHA256c474bada947ab7a810db5a08a3149e673583be9df052914dd8c69ca91f6fd01d
SHA51242ed9d414881d297c7243ce1e4390a80d60d3e1ad9c1bfb59502b72fda37dd473bec249cf724de146b759ad9dc509943026013fc7928912daf528e2110ad2b10
-
Filesize
2KB
MD52ee07056e10451cd7fe76b554d85f657
SHA1f2cb6a3e902f101c60c6bafba6b57aca4d4c286a
SHA25619e66ccc7c4a68b42c667d227f9f0d4fec6251ce5972a021a48492133093e66f
SHA512cedf196c65503c28c648f9cef6359a0691868c87af71b3d858d0e45f05a20ef2a59370ddb4e4bb17bb1294d168df718dfdbdd72f34b52f4c7b56f38dd9ff678a
-
Filesize
5KB
MD569428a1956d1caf48a488060a408ea69
SHA1ed617984d565021524810552070ef8b49e57a7bc
SHA25607c0cd5d865ec91ae3a962237281f6a3a632b4c2128602fd99f50ff31fac1f6d
SHA512c13b515e29f8e8b76667d59dc7164126c78a478d754f311da156c4044fab8b184f8d9205024f335a37c3640fc8b92f314a4eede3068ce0d3052905897fa4b433
-
Filesize
7KB
MD595651c221bbdf8c80b642e8477dca5bb
SHA1e7463be9e1f224e16e44b7af5e0d1f0bfaa2cd69
SHA256710fc1954bfeea2a294967443f84cb983a163ba3e03709d70f0cff4fd206156d
SHA512a71eaae1e27668e178e8109f459e96a02ae8e2376a633bde2f0fc7a4f1f69242d7ccc76648dad4eb810d3f809f40dc44b532cebf857e2a6eec5c310973e7bddb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54f713d02e988e8d74b887730028cfa17
SHA136f72eaf8d3feda51c9b4656cf1d026b3d0c21f5
SHA256e77bc3ef218c619b0fcc26891c9df6562acf16e07639fd465daa03088121bf93
SHA5129e245b55938c5ea0fadbbca72555708cd100f3155bcbb6b5a3db1d9542cd3b332adc8ab8c8955948bd5154b62500b3ff81b075a4152679f01a1b834a17b7f688