Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
04fc23f06bde777e89dca554d763ef49_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04fc23f06bde777e89dca554d763ef49_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04fc23f06bde777e89dca554d763ef49_JaffaCakes118.html
-
Size
75KB
-
MD5
04fc23f06bde777e89dca554d763ef49
-
SHA1
01fec5e371f2b605cbc91a5a50de05b4e72d198c
-
SHA256
83373549068145112467f66c7f80682562d0e131251cc20a98c6fb76d2e409ab
-
SHA512
9b232c7ea6bff6071287735807eaa2ce129ad30713325bf290efa71228a163b5ab08e586b94ecfe98e120232bfc08bc0338e141608362ff1bd3867e6fe0126ee
-
SSDEEP
1536:S41OoCqknXHzKt5Ep3O03CRzDtctotStf4sGL:h1MPjGI3O0SRzDuyctx4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 216 4616 msedge.exe 82 PID 4616 wrote to memory of 216 4616 msedge.exe 82 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 116 4616 msedge.exe 83 PID 4616 wrote to memory of 4196 4616 msedge.exe 84 PID 4616 wrote to memory of 4196 4616 msedge.exe 84 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85 PID 4616 wrote to memory of 1012 4616 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04fc23f06bde777e89dca554d763ef49_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffcd3eb46f8,0x7ffcd3eb4708,0x7ffcd3eb47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1788 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,3506224769473363191,17264659776970902318,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5038b1f2c12cb6ce7f7655c5ef7a1ac53
SHA174c2e966113fbc113a1f44e30c440e18e8fd7bb7
SHA25604502f27bbd92c0388a77c372da29765b815c602c5464e44f9744e2b3b455003
SHA512d60cd0fab7e4f08aaaba2c85b437d2c9b0238a5e42a693f88c429a174c68945340f3678dd865ba0fa651094618403712d9dae35939d3787044f4fd7c68ec098e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5cab2883d3735db19b36a07d1eff52416
SHA1e5d8291c8aaf175e483e38e26bd78cc6289f91a7
SHA2567183ba2879d1557e6120c95a925b7cf4abe9f1b1ee9e61f6f51b1307512dbb71
SHA5128e90bde79021bf3a3146cce7e9f0571611180d5052d4a2d45c36eb83051a09812f12333342bab23ac16a8a79b67f2dec4ee181b6429c57c8cf18d594e72a82cb
-
Filesize
1KB
MD58333df33e2d76639ce45e620f071a696
SHA1209171ba27b7ff51c2bd167c48a97120588ef4e8
SHA25646476187d27fe26acfd8ee594b69400255da0f37ca0abb2d3ab30a5bc7e01f0d
SHA5124a8cb9fe11c2d3a99e460495e2bd6e7ddf07d358b6a4936000661dc1300de2f9a9b67f5ed75ab46bf987c8f2bde9f688f0e5fda6d512a2f6ab3cc264704f9703
-
Filesize
1KB
MD59bf615db80bfbab25fbb410db9925421
SHA114618079092a51d052e827414fa0bd2ba183415e
SHA2567c9f9084a0de5e39b219786054e48eeff02aedf8e2089025a9130dbe654b5636
SHA512087650c7689b41c0417007d8146591e1e74e530de6d303fe1abfb7ee1372749efc41038e9283b45a5e87811cf6bd83a7d06304dd95e3ae9260e2d7d902b57760
-
Filesize
5KB
MD55815d35d8fe6fcaaaab835dfff80a61b
SHA1ca7b19619b971e519f2b3de73bec5b9aaf9e0440
SHA256c12ea1223f98f9e00f77865343920a708b89fc6299a78b2aad47bc4e5956f556
SHA51253c30cc139e934913e0d383941cd9f37cab44bd2a19d72acf3e7c6881f65a35a664a98f0150749bb3fb97570d733b3df3911e527f4c192a65155671f919bfa20
-
Filesize
6KB
MD5c1dbc4626f3ace23528e75497da9cd11
SHA170e79994cb2aa6678936abce6b1273a712fe5254
SHA256ed172d0b880e9a44b8ff951cbddbf643cbd6d85e3d7e74b20b8b6f25e981feb3
SHA5126f04b9c619ef7750fc258ba6a8777ed4cb9c130911d1ba0c403471247e108f4f197e4264214f1c9cfd7deafba9dffa7d31c08d48dfa44767d4d34cc614534f3d
-
Filesize
6KB
MD59232687626b68c92fcae60aa98959b45
SHA1e0e4a6cc852fbc7c124ebdca20d663a1bb643779
SHA2567148546666b3aa898e36a0d0b8cd6a59946bd1479444ccb3e4cd7ec1a7946c66
SHA5128b46e5ccb57721f65b5fb56c71a3c7d43b01ba722cffa5448644a500379add4824d5dde932172270f600e8687c0a1bb70b4c36f6c4ef63aff2dd7320a6df720c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD575848427c3b5ec077b4fbade5693208f
SHA1836217fd54cb3b6c21aab31e2d6b0e04b38bbd87
SHA25637bfdd3ae46f859509e36c1a69c2404fdcb64ce56204d12e8baf1796d6b8d09e
SHA512e246ac76abe219c67197f9fe285570ae4aac69aee3dbf7b5a146167a622569ff3529cc1274fc69e14831de0f3adf85030bef9226c83eff47fd32d0a855508e76