Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
7d91309ee3d661261029c0f91b21c661_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d91309ee3d661261029c0f91b21c661_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d91309ee3d661261029c0f91b21c661_JaffaCakes118.html
-
Size
175KB
-
MD5
7d91309ee3d661261029c0f91b21c661
-
SHA1
04f55aa85c92fb4ca3a4b4f2b2d7370ab4050477
-
SHA256
fafcec85565b5d3d61f317cf15098e7f122ad35e596291bf0664150e4eaaf696
-
SHA512
5a5208a5f786628c505b31065776a7b93a4b8914cf8cc0d3c512a8bf1fdb8ce73d9676ca0e61fd052a855bf262c7256fc89ec924d7af0a3739f88b4f7af7cec3
-
SSDEEP
1536:Sqtk8hd8Wu8pI8Cd8hd8dQg0H//3oS3uGNkF4YfBCJisi+aeTH+Wf/Lf1/hmnVSV:S7oT3u/FdBCJi89
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 4808 msedge.exe 4808 msedge.exe 4520 identity_helper.exe 4520 identity_helper.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1136 4808 msedge.exe 85 PID 4808 wrote to memory of 1136 4808 msedge.exe 85 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 884 4808 msedge.exe 86 PID 4808 wrote to memory of 3176 4808 msedge.exe 87 PID 4808 wrote to memory of 3176 4808 msedge.exe 87 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88 PID 4808 wrote to memory of 3172 4808 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d91309ee3d661261029c0f91b21c661_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffca1246f8,0x7fffca124708,0x7fffca1247182⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15494475714952277141,11087401579523348574,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\03bc8983-36d0-483c-878e-a25cbe5d1b47.tmp
Filesize2KB
MD5277695bcc28ad412a9f2ac13a0c1e55b
SHA1074530f9c1c17256662af11265d07d85c3829f69
SHA25616358725b5c5fc8971fc17b33c15d7d5f81a3e18f2bfad66f667be891cb2f091
SHA512f7c206002f7cf955de16c079c39d012c7b572ed91edf7306f37a19fbe8052eb6d8bf4d5d078501a6d789adc160f4e1251d975f97c356ae319f643981769b8f23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD555b7aa5d6bb98eb2fa6e80a302c883d1
SHA1c3392489df4af8b6adefb8afca1c30d8a83ec210
SHA25618fed4f5150c979510503450b4d3eaf8e611c9b601e07f0365c2837a89ee02d0
SHA512d991d524c7b95c88d2e46501fe32e6074a13258eecd1701c85ccc5baad87a910c55e29e86952e98fbc9547e716491dca09a6091db04bb9dc1d55b627df9f3ccc
-
Filesize
2KB
MD59f31563f547e6dcc01bf668081edf947
SHA155fe90602ef83d54a972db70e6eff088f615ebea
SHA25650ac5d650d37c7e8d60e09dd5dcba259f42dcca2a92f675b504a82bc1d0e376a
SHA512ec296ad8601978cd87a3697596fc54e7c68910847442fa01c84ff3987c5f887dbf7e9acf62856e8728fdf0ae98182fc2224168c3757bf0e43774c30156c71d0d
-
Filesize
5KB
MD52d13c7228aab106a9f7aa3e7c2e5e6c6
SHA148b12b11b6e751677ee6c9310cd4447858ca7b87
SHA2567d315523d931220a80ac68f48bf674673442cb2911f1007e2c165f26aef930b3
SHA5122da8810149a2360105b3f86bd4a812f5ea08883e395a449836d349ca316cf3dcaa1a1ff37de44d48f9618d5795e192e4b7fb9aff7cfda67edb1efa3e3d26ac6d
-
Filesize
7KB
MD5fbcc8b16393c308657be93eb744f22c9
SHA1a652e5fef2048878ac8af86be964d89bdc5bdbbc
SHA2561b6ca031bd5b0b8651f6fc6e5554e60fac7b85a94eb98c7b1a438e7f780ff6ad
SHA51234730b32ab3b47f9c7df6f36357ca210d91dbe65329d9f7796c233b87a1d15a7267fb40e39c994207c0977cbc68e94759be86219fdd87874dcd49dc3bb949f2a
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e204941cce0fdf31cecc09725cb9f42a
SHA194dd2c653fa09034aaa0b05d006c35e57fc75f9e
SHA256789fd9127a2b2d4ff9a88d593f9303699084840af9b5c95e6f96d071660b59db
SHA512772f69c4528ee3222ee3cc4e13df6c5cd21801642c7a9e0c130afce5124bd71f788af87312079cf42188ad3fea23624aef1d8949437b07b4bc151c71a7d34533