Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
601c2431f684c6fb9c2b4c2775acfcd2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
601c2431f684c6fb9c2b4c2775acfcd2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
601c2431f684c6fb9c2b4c2775acfcd2_JaffaCakes118.html
-
Size
175KB
-
MD5
601c2431f684c6fb9c2b4c2775acfcd2
-
SHA1
a857fb5e76f1a26b8c2f5bf702f35930c111197d
-
SHA256
9263c3fb1a7908b1b7ac235d4ab2aac5d0fff682a24685dea253a5f2549e164b
-
SHA512
642671a3ca58b1018c9991b9ddf237b89a1b46211d9ab380b1360e26fc95db61e01f5ed93d6ff76b8a650f8af6f387750644ef21a8d3a9f2698dd9fde10fdcdf
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3mGNkFjYfBCJis4+aeTH+WK/Lf1/hmnVSV:SOoT3m/F6BCJimm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 5060 msedge.exe 5060 msedge.exe 3720 identity_helper.exe 3720 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3696 5060 msedge.exe 84 PID 5060 wrote to memory of 3696 5060 msedge.exe 84 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 2028 5060 msedge.exe 85 PID 5060 wrote to memory of 4004 5060 msedge.exe 86 PID 5060 wrote to memory of 4004 5060 msedge.exe 86 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87 PID 5060 wrote to memory of 1448 5060 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\601c2431f684c6fb9c2b4c2775acfcd2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2884909113617382877,5441310766911108418,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD577938066664bec5f14cb8437b56429a6
SHA15543f12cd17f81df8ad3324a96c60c1b32f42ba1
SHA2566b7c4d80ed776e42e3ef13a134aec53410b2a91c72d9231c19010c8ba5967deb
SHA512bfc74afb04d936c4cabd63f4d24837cffbb5b0b48633ccd80dba5678ad14bdd00f1967bdadcd974e5fa6c712a16f3c7de25e10cd1834b76276838c91975e5e65
-
Filesize
2KB
MD53d2eb94ee19b964dd7467b2493b825eb
SHA1dcaae5990b805d4ab5953ec19154f293260acf1a
SHA256c94d0e392e942c480589276f2ba9506d1a5e80656ad03f1a56b73b7d426009c3
SHA5120f8e6b226790364d46f824cd03435c2b9a11fd90cf34fbce3f498c7e2df1563650b0f1d32fb4759140ba9f0507237fa00d2a580719fb12dc4293230d5c3498a9
-
Filesize
2KB
MD58f9a8d5932370d77bbc6438683f4e776
SHA140c49da095e91c855c5d0fa2aef655b880f9d568
SHA2562198c9377d1606e4fb09aae08cef08e8ec8d2f755e9fd2528d0a4d56028dbd61
SHA512d8d6340d4a5d6d57f2a74803d59cd18f8013f5ad38c61b9710662206ba38b4a7454f03fe5c49831b212349b11bd8053136b7b9b2408369383143c423c7ca12cb
-
Filesize
7KB
MD54db9060ec17ce09f7d06870afe95b761
SHA17d0b2fef2f4426f30fe1057607c471740d378e2d
SHA2569638f7fb8e5554e325b03df122e505ebe5c7fad9f408029ad2655ee978606dc2
SHA5126c15d32f32c04cdecb7161a342be0c78ade60854aaf31cbb852b3599c6ac0ed1d10eb44b8edfbd99b288305b38dbb28bf1c1e6b5cab6da3fec42e38414b582a9
-
Filesize
5KB
MD5c1a271d901f12ef281fcc929d8c5f6a6
SHA1f547af6638fc4e3fdef466349dbfc5268abeb661
SHA256f9b3600f441442e1921e8acbf35d00525d39bf3d938ccbd3664e1f487a997420
SHA512a0734627c474e01449af90f4dcfadb0b1ea4993356e363520406785e7fba4bf9fb8799bbc192b769becb8d492aa96e4f5eea235210362eea345a1215121c2a83
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD54a2c0dfe06751fdf8a31fbcb08c5beed
SHA1059c04602c375609711f29597de2374fa97da7c3
SHA2567d74be4154a09381de252b1f9f5a8b97373f39617f33679b5e450c21d1e44eeb
SHA51249d9fc1048087659888f15007fd334b03dad5cd562df536947fba08348156287cd4636dcc26eff9bb697cbc7fec4cc420589e0ac8dcb13ba2a4e8ffd32759123