Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
7053dea9e9cc37ae0f3cc8f0a373f0bb_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7053dea9e9cc37ae0f3cc8f0a373f0bb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7053dea9e9cc37ae0f3cc8f0a373f0bb_JaffaCakes118.html
-
Size
59KB
-
MD5
7053dea9e9cc37ae0f3cc8f0a373f0bb
-
SHA1
22576dd80df26b59a28fa09cd96f8ec260832d00
-
SHA256
aa9fc6c0f2abf590b65f2523c8064f5712ea2a6ea72f2e540854f41d03c2d4f9
-
SHA512
757b29ddf53dab2873841193efa0e3b8fbfe76d446085b97308ae8770d3b74ffa41b36e281a7202e082691edd175c2b33532efb435290f0c7966b3af8ad9bcf9
-
SSDEEP
1536:qyEy0YWXDU2QtbIH9pKscqc9qsJNeVUDDkFGNbV04IiMYRjFhowLe1/7:/biUtEH9pKscqc9qsSGNbV04ZMYRjFh8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 3024 msedge.exe 3024 msedge.exe 3164 identity_helper.exe 3164 identity_helper.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1328 3024 msedge.exe 83 PID 3024 wrote to memory of 1328 3024 msedge.exe 83 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 4032 3024 msedge.exe 84 PID 3024 wrote to memory of 2004 3024 msedge.exe 85 PID 3024 wrote to memory of 2004 3024 msedge.exe 85 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86 PID 3024 wrote to memory of 1792 3024 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7053dea9e9cc37ae0f3cc8f0a373f0bb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7fffa75c46f8,0x7fffa75c4708,0x7fffa75c47182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1748 /prefetch:82⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4358463059267153895,2877811873052064161,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD53c44a384aae07d920baf490aef7b1189
SHA1bb3a27122cb1e8f8fa27d7a9d01d7024f9d3f17c
SHA256c8a97eb003da303929bc35e670a5af805fefd2e1a2239aa163c704b858c4141a
SHA5125206fda427d75f98bd946264167fd01484c0ccec45bfe0107eb8f9bf8aff0cb1432a79c66de613fa9e300b6bac4c4ae5f7b23377b10fa1cab81f30efe22a1e27
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59a56d639e8c79aa1e8e29bbb1ec2bbc3
SHA134ec686cb0843c9f1fb81c12b7ff2e959040321d
SHA2561b6e5289fdcb3a76914009907476c109d0c145b80f45bd8dcc3a0c04b623c274
SHA5124d4f0530548ac3416b2f2384dc160224bc6c425a74df32461f3a6eacb48f8c6271096a3b3646dd07f9c1b2918bff462a1ca8302966a1cfee1bb95c40f5796298
-
Filesize
1KB
MD5313e79963ac1d0fa16f9a14bf6d29630
SHA1192d08dfbc9847edc7cbc09bbd224da8edb69884
SHA256a77d7e3d21cee272613b4326cc548e814e154a10791fae5ff18c44bf02b6a3c0
SHA512f2532c1aedd3c908dc8173869ebcb9b161dd8de7836f6d6e29ca4f6bab83bdbbd064621a7a35d097ea140030a2269c5a4880d6a36d18f19832ca6e81a2adf770
-
Filesize
7KB
MD5505371ef43c0caab06b89e577c5dbf7d
SHA1c33f84ed861118f822c10a369068bc43d8004f85
SHA2563f7fa5a830dfe22d352f5bf266e6d72d1b292efda6ee493627323b5b685ba04c
SHA512d867190a09882dc3b2e35de56e2a89b3ba61f9e6f4a33c97bb6e1c7549f0395d2bd7ce8fa9ef448ddc26a438e3490181c0e31e4b1fc1afc90e20267aa82a872f
-
Filesize
5KB
MD5b0893e792ffe0dee945f5370b17e0d15
SHA1cdced710f7fc5cf7a067de21bff11e3851f5d9f7
SHA256404ea6d31a6b34b27c634a2b630db015ed10ab810d2e4a4707374b8bea863789
SHA512369b0cfd6843335dc248e3236d723686aee7ffc2b6bb190c2690cb227a4a0ccada917e5aa677add59c79c3fdc8b46b77ec793eeb241e89429b4f2b49387089a1
-
Filesize
7KB
MD5ab20a9455475c1131a563214e24328da
SHA1d4804b22786d6ebd718ac87058793a3fd66d4e11
SHA2561b6c5e2cb268882ed3bb9c864dbcdd239f75365f5e817b06684d89eb78ab5ab6
SHA512f54449fd65acd0cfd6c510aa14b8a482fd91f530bc7624d5958d0ccd6f686f0f6106855215861516a048cb7a98e1bcc1a4ea39c7d750ebede265d97033322ca3
-
Filesize
7KB
MD532699c7eebc665305fe8f986de5affd4
SHA1729dd31d77751a25ef0617c26f58c8132297a4a1
SHA25655a31991931222ef21d44fb515ea32400b0884d38b54b3b68609c6b5722cfa8e
SHA512ef9f77ef37ee270bb883702bf4e8863708cd8b06c24cc9b577c03633b0ff56f6dc814634b4ac50936abbaf211c7fb93c6288e95c2d44b393c91ee62b62d0d688
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145