Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
fc56c8648fd5515485926d802336c359_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc56c8648fd5515485926d802336c359_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc56c8648fd5515485926d802336c359_JaffaCakes118.html
-
Size
55KB
-
MD5
fc56c8648fd5515485926d802336c359
-
SHA1
d92def477c66afae1aa24703e5ec2b9fbdfabf4c
-
SHA256
8ca870702230faa745fb96b2bb822bb651436defadfd96bce576c7a3fd37f25e
-
SHA512
4527f1e1196739f4a79923251402e0f0818689f7729e216683179c957cb5b23ae011f3dc6b97cbafe04641b2d73f81154e2b85cc978398085e558f43227260de
-
SSDEEP
768:6CNXPIpBbkHnUOlngDwKerGf8wBfNLIDFBSgrr:6GIpBbkHwf8dDF1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 2052 msedge.exe 2052 msedge.exe 676 identity_helper.exe 676 identity_helper.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1692 2052 msedge.exe 82 PID 2052 wrote to memory of 1692 2052 msedge.exe 82 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 436 2052 msedge.exe 83 PID 2052 wrote to memory of 4800 2052 msedge.exe 84 PID 2052 wrote to memory of 4800 2052 msedge.exe 84 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85 PID 2052 wrote to memory of 4808 2052 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc56c8648fd5515485926d802336c359_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa527746f8,0x7ffa52774708,0x7ffa527747182⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,8184806335959494825,7389929976033467028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD596142ba45f7203a8c4d877b2d70588b6
SHA1e1d1ac761b3c41ba0a3409d7bec68ca22ae1fac7
SHA256dac3fb834fb077720a5a79f49add75e37c15bd07ac063b5516061ffc611c334b
SHA512fe09d408370c5ddfa3264f870118fd2edb2e4184871a8029bb62a438be6da78a8e1f72d176149ce6a4963e9981136dc878aedb1e0c660833482a9850680a4beb
-
Filesize
152B
MD5b367ffa3cd6896506992c5bb8b91addf
SHA193c9bded12fd3a814e4a87d1ab6b102818a9996e
SHA256a2e0b202caf41d3a5fbde3824043e423cc9ce0ec9653a9d1a2d23b04c1467b96
SHA51244e2745fad967ce9b7a2be00b75d6617d441ebe2763d81a8c038d57906b1c94d6d57c930141331c39e032a284b59014646dd9054be213fd973e75a2269466a8a
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50f27ba99741c1e32bfb4ceff23710b53
SHA141b61144d934be9c6d0fb84e9f8dc88c1ea9b704
SHA256d6306fb78b92618ba0e1decdc12827a72de201261aaf8cfe21ffe494ec09aee4
SHA51231ca9cfab422127d40bbe38e0d55ebd48ece9114e881d1312f617809a9084e9d4bd1329e5ca1a21556eb4ec374cf3fe47f562e642fedd009a6240ac4b86932b2
-
Filesize
1KB
MD5bb44b64493a04733989e6dfeaee947b0
SHA1e4cef130c0188dc15f217469b16d6c12cd000482
SHA256de4d8298980bae5465dea20d7ff6ecd770187302f0c7f7daeebb2b5953e7d293
SHA5129a0507798f0b04258c88a55f6eaf703b34daafc4147b9252fba23fefa3037732356991d04555c073a8fc3ab9ff2e7f8af03fdd4a78aabbb312169162c53a137e
-
Filesize
5KB
MD537cb1954c68e4c1f44b6505ddf0dc2a8
SHA1b89a2d7c730ad6f8e67bf4795c578f9479e4a753
SHA25600b0ad1f940fa6f9ea1abecacaff1a5ef84e90ff900b8c478f16c86274169447
SHA5123424ee302b339d902e3e88524b764400988ae7297c390ce11ce19048a47dc1e126d1e19d6c0e0788558ed470b940e897fac94ce8ba963364dfee44f3009bf03d
-
Filesize
5KB
MD5b48e89100fdd9226b16195aaa755a5e2
SHA110079f91ef32c7e53067793838e9e46dfa1ebefd
SHA25667cffe132214026491b921d5a4cb1dfb00e13065ce198b624e070dac2ff9a05f
SHA51200e004563823c5534e9a2cc5fa3b4e3e6695685709510356538a73ce176df811e67a806e75a56f97ac8a883f8cad6f85b45cd006ef87b6eaf9db7b86d5490802
-
Filesize
6KB
MD5802076e546d902b8c087c8f11e43fa33
SHA1bad8bf34dc3a27661229cca2e50cc305dbf2a93a
SHA256b3e419fe823be1776b967ea3f2d35efb4f405103e93c2841ce6515b56890f1ce
SHA5128e2d5c4788e7088f00498090a9f65f73b75b7b5941a5040da51c0b62ed5b47c7b9ba2dceaf46b781929e15ab4a892440fdf13eb84eeb530cc40206b0f076ef18
-
Filesize
24KB
MD5852d886f30a60b001ee9e16d15da655c
SHA1713ae02473e2af931fb4455db3be07a00c734e97
SHA2560c05a4e24bafde15c1c9cfa778ac25eb5552c22b1a589b7b473eebc752a6ca68
SHA51209625a70076a264b7138dc14f2fe81b0e8ad6cc0ecb3cc4f5d5bd73eb58fab1e2528c5e3a3a40837740895a5a694b94b2fa174a8595960ef122823a4132d4f73
-
Filesize
371B
MD586611bfcc9fa273f3d844aa973f8a700
SHA1b9d8e8763731abf2f6e69c3e3f5811d617778262
SHA256ef2b2cb438736a290449a07293b0b04b8bf48883a4d214c15f1e0e308779e60b
SHA512f801c9c226125212056b3a21a34f918fc473a8ce6d235ddff5ece8ef6fe164cd6f4564c3d8f15f034b699d198d82e648a8a497e6608f6dc6f12677af219d22a5
-
Filesize
203B
MD59a1fe829e11218854fe09f2ee50b4604
SHA169beb88d9945a3b73524e1271be495b3da002c77
SHA256ba21d4a272a93533b40c5fd981ba5f56c5013897f2d48e529d9ab31796c9f59d
SHA512c33c0bced0051aff550f683fac4d6e922945c85775eaa35fde94b5d04f9b87bf5b5702bf98f3378a64b2b7c10242772e56666272a8707371b9f335aa0584d8dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5359a34bad58147f998141f9f02477ed9
SHA16b9d48c809bb70d8f85183e85ccac8ce6fbc3f8e
SHA256d659bacd49d6dea9a00ca76bc546033ec3e31b8fb5b76e68408df9bcdadcef26
SHA5125551ff7b131a6d9e9fc7027f6b898bd0539705114da231f57202148a87d8538795f7f9b69460d24b847b4f315b9345a672a5f180f94fbcab371ea562d7eed343