Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
160fa7538b02fd8b5c2a291d6bf5b070_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
160fa7538b02fd8b5c2a291d6bf5b070_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
160fa7538b02fd8b5c2a291d6bf5b070_JaffaCakes118.html
-
Size
28KB
-
MD5
160fa7538b02fd8b5c2a291d6bf5b070
-
SHA1
11be44c0670fbea785db0b9b873d1e217ccadec2
-
SHA256
159db767a2a7d69f4ee430322404bbe272de2f775b190936fa2f14133b62a27b
-
SHA512
c1e29734751840178a9fb632914dab76fcf3d7410d9f882116fd7c35e75afc4e7272503e437d20ac2c9b4770033356dec3016ef73111d6d49f2b05a317612ef8
-
SSDEEP
384:ly7s2V4we7CoBVBC4lwgwNBG+kNlU0BU0UAUJPlo0BvB6BY9kfItWB6LBVBRBNBV:Z5fXBZ5zoXbGYLecIEvL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 3224 msedge.exe 3224 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3068 3224 msedge.exe 81 PID 3224 wrote to memory of 3068 3224 msedge.exe 81 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 3984 3224 msedge.exe 82 PID 3224 wrote to memory of 1632 3224 msedge.exe 83 PID 3224 wrote to memory of 1632 3224 msedge.exe 83 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84 PID 3224 wrote to memory of 696 3224 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\160fa7538b02fd8b5c2a291d6bf5b070_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce9946f8,0x7ffcce994708,0x7ffcce9947182⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12266148542709012983,9625741341576545887,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55538b99f25bb4b0245026101bbf3dbdd
SHA11196adf10ff0d36b026313e62e53dc49f223103b
SHA2562f82f533c49bcda0693d4d77c4283bbcb941aa2a321473b659700fb2cae4cd7f
SHA512badb4b63e68dfc7998fdea3c91824bda71f5422ca4ff37768311e46dada0ae3b92fffdbbb6d31cb6e2fd2c06a33e5bf4956df0efb04333e240c814dcf649c522
-
Filesize
609B
MD564348363a7165ad6c8172a6e14a0a48b
SHA1cbe31a7e7b9bf51bb15b0847035016c146c8ea5c
SHA256766a045255997d0686dfd66062aa464a5b553f7f2f543e08bb6990f55796039a
SHA51299ce3772da4de7e917a13b9bc07eeaa672fe55feb1ba0d08839a85e2ba4a796c76c69015914362aa0bd347927bddec000dbcefe6edd1d64bd4b04b98218af32f
-
Filesize
5KB
MD57a557b134418efa1a07bd6aa3f76d228
SHA1d98422b8680455a9e12439b87f97fb3a15103585
SHA25620f9c8afcd13a63a9ade04eba62a13e1afd33e34646494f5903af774c9ba2b84
SHA51284470ddc62cf845204c57f2997e1d3c283a6d87652cc0246277a0299cf57f5570fd33ff96501695d6e1ce7fc05f9ada73bbe5b0d18a5d5534e16615f147e3231
-
Filesize
7KB
MD5fea2aac004582788bc5f7bd9fa708979
SHA138e5a42c4193d0f20bc41ebf1c2bfaaac17f83bf
SHA256e7b709a9f262fe219249a95b3cdd657d8d26ebe4fbff5f0fd27a693be99e6315
SHA512edf9f5bd653456f53c75e5ae5147a166e531568866bd3e500e045ccddc096eca301d8d0390f011eb43c89d0b5503b1441e4633eddc5f933575232e0fb7d0a512
-
Filesize
539B
MD5162bddee941a76b5638cbebb34d58de8
SHA1e78ca8210ad4446d712695cff06df97144bc2ec7
SHA2563ffa5a7d33bace92ac8449ef570fbc4df689e8493f926c9293dc87734e45ffdf
SHA512f4316b35ceb53a8aa962d73e5f1e6cd9e58b0aa587f39e46774963fda0a056b3da05fab39ccc1bdf3c6a01ea86098c8cdec3190e91a888abcfd733232321343b
-
Filesize
707B
MD5b4e4ad5ce7e5c4691de2a90bbba87624
SHA159d3be471144320e1be9472ead5cfad186873546
SHA25624b3c6e9857afa253887f08c7e70ce2c33ddf7dd4131472cd23899bd778b7cd1
SHA51248b6285c607d8e08b9fda96a0ccba123f80d4635b5e497157862f32adc2b5a8cc40aa22eba6a485c1d2006ee82c8011746665a82bd5cc5fb8b620727d1c328ea
-
Filesize
539B
MD5f6e4c70f578ba793667dbed33326b638
SHA126e4a2627ab8fab9ff44b0ee5a7726494f17cb7a
SHA2564d7f1fc854242d1af81aa514595749a9c68fdc313f4f5eec6c50e9d6a8476613
SHA5128eac091c97588dc84f408dd8a60c83999cb0e543df42f24fc5c7e9324032c6cfe774143b45f0b8c0dd06b5d52252956d28354ee581bdb8d117d4c5be346e90f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\dff26fb4-8f67-49ee-b78c-0f38eb46b05f.tmp
Filesize6KB
MD5042783299af13c53af99ce9057171de6
SHA17c64bd3c99daa523f6a4a70c2a8caf55c77cc2d9
SHA25637bd9357744924ef9ac9283aa7e136dd2e1cdc8c1981f109d8122b171c37739e
SHA512e61902953ac90f2e9691e0fe355446e4f067eb6bfeed6a9befe5fcac6dbfa2391013e4188dcc52cad483ed0360c512610a9e047879804ceae146ab2f4ed5c9f8
-
Filesize
10KB
MD5fc64a8fd8e9c37ceb8fb2c627c254440
SHA17735c18b5c3fb0759a83f96caf0f5400d5b0d39a
SHA256593952af8bf8a46862ba828b9f5ade7268286ec66e0b63b711259783cbef6a90
SHA5126a5d93a06d05c297631ea24b138fd6e3e83c810ba2b319e4f4dd981e5634c21d018b95d6e1651b9b6b1f6870be3af5207a3907a4588546687f9893a65cc0d7de