Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
8245c53cfff49b1171ec4b6315cefd3b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8245c53cfff49b1171ec4b6315cefd3b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8245c53cfff49b1171ec4b6315cefd3b_JaffaCakes118.html
-
Size
175KB
-
MD5
8245c53cfff49b1171ec4b6315cefd3b
-
SHA1
478b7c07fb551f160f9691741696a927b2f2eec8
-
SHA256
7ea1f7274a364741fe67ff8e443d984f273291d9328fab5d544263b4a8d2a278
-
SHA512
bd817bcf52e6f7972dc4688df9288cce1052511620b742afbfabfa7a09b373a7bd52c8e8107c6d82feb27719cec9270a6eb8994c9332144d490742e831d74021
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3cGNkFaYfBCJisD+aeTH+WK/Lf1/hmnVSV:SOoT3c/FbBCJi3m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 4392 msedge.exe 4392 msedge.exe 1508 identity_helper.exe 1508 identity_helper.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4724 4392 msedge.exe 84 PID 4392 wrote to memory of 4724 4392 msedge.exe 84 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3552 4392 msedge.exe 85 PID 4392 wrote to memory of 3076 4392 msedge.exe 86 PID 4392 wrote to memory of 3076 4392 msedge.exe 86 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87 PID 4392 wrote to memory of 4868 4392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8245c53cfff49b1171ec4b6315cefd3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1759715192479047245,16515474872358695012,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2536 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5c10615a14abfa46ed30800b3ff9d3d31
SHA148c10d525ef930abc686b514d79032b7553c0219
SHA2563f04a2f1b5a66ea2fd0d69e51b6c3cb21d46a357e9d4ac6e083dce93b79264d8
SHA51259a408eaabdb8c5b02e231830fe88113b825536df53a4748d34ad632cbaf9f24e8d8141faa83483be51d9d481a772b3b1b3dc10297cd8c85b4fb99536be40d42
-
Filesize
2KB
MD55be3e76728f7815c8d1e60f1bd824502
SHA132ee2ea3a9ab6d739f54e7f59399326202d3f775
SHA25671f7ca73917f7b67026271dafd276dc69903ef935d48166179fef5ca51db25b9
SHA512735230f70f3ccfe1260c17154baf5aa059a340dcae1ef6d20a5ef8d79d793158751a593956159833c288f05f94807a21bf60fbd123607521825f7a813e4d49e1
-
Filesize
2KB
MD5e4d0770330c105d4416657e1f8369617
SHA1d1c590f065dccc862b980fecc25fb8234220693a
SHA256f181fbd92bd0f75842831aaf9a7ec1d056b67946f2d3684adf5c664ed6dcef81
SHA512907734df368505fc1c95ae2c5375d0b65d1a23487d9a753e41d2359c5c29cd5cb0842f0d58c24428ef3a7d719e3e92e62aea6a5fb7a82d3bd670a17837b322ca
-
Filesize
7KB
MD55ec634b680a09bf304ed13533892dfa9
SHA18a1cbb34ceb55ff132a126659537f0752df68c65
SHA2560b9004677e55b3638a25a0cb06ab2a779e430de03dddf0a9ea628c4cfa8e3fcb
SHA51232b7cedb5d3f2939823b632213b0cb1b7a15cc2749990e28e3e1d2eb331406579ccc7dd37827e1c8a93b9225b8c1664a979d22e2ada3dcf9d454f829f9f99d65
-
Filesize
5KB
MD5682dce209bd13802dcffe379a1ae3d04
SHA1bbc5c91a84a1d6c812a81e0604d436b77968f259
SHA256b855352dff8bccee6696b534d3e54c530c90affa1094dc6e4d5cc6fcd919d243
SHA51292fa59b521821428b8350390c99eb368142a570710a30fe7b6f06ef9b37290ece6205f033ad77cd75eb3b16f7c203979c0da70ded6e62b76dcb21f20c8e27318
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5cacaecd492990ba86bcf8e10bd903cff
SHA1194248ce0f00d8bfa33300106c7d453d2a8a7969
SHA256177c0e88fb0d863ea444e516c41f7df2c1eccf020bf7ca5b0fdf3ad88dd922f2
SHA5121264a9536d094e4c3fb734cc5992167e987a980b08592b2f2246702683c8511a794eb1fd1ff3749705a52462409908210da01c3b1e374f6e9a7b554a6766f5c6