Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
f0459dcc477bb5f3726b701ee48de68e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0459dcc477bb5f3726b701ee48de68e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f0459dcc477bb5f3726b701ee48de68e_JaffaCakes118.html
-
Size
432B
-
MD5
f0459dcc477bb5f3726b701ee48de68e
-
SHA1
4d8aa7950f589abea273a2c0b132c123f0a7029a
-
SHA256
3591b556e2aa9ce35c2b59023166455e743359a67a2a29d4f294b6766faf7041
-
SHA512
2ee98eb5404780a823db6894aa955f5b2c825d5ee841f2341a913cf834d8b4e279d56e47227bfaf37ce59fab4197e6428d85933342d1363a11b22c649e3e7db3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 1656 msedge.exe 1656 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3012 1656 msedge.exe 82 PID 1656 wrote to memory of 3012 1656 msedge.exe 82 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 3972 1656 msedge.exe 83 PID 1656 wrote to memory of 2628 1656 msedge.exe 84 PID 1656 wrote to memory of 2628 1656 msedge.exe 84 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85 PID 1656 wrote to memory of 3044 1656 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0459dcc477bb5f3726b701ee48de68e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8bf646f8,0x7ffe8bf64708,0x7ffe8bf647182⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,6133991688971534374,12647793559011192829,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58c91c8582b0c918416d14bd7eedd686e
SHA1b2ff8149bc21144fdcec64111afda492965c6621
SHA2561e839706b748c04adf8efa2790564ca1efd707fdf6451e71af6862e07123717e
SHA512a93be868d9f08097bff39069378a0bfa0f5c78e74e9e8df820be9b0426cbfe84e03e9638b329b6142279ed140a120c4c4c21857f410fc4789a370445c3919dcf
-
Filesize
152B
MD52579d07b98bbefadc929d80fb3dbd32a
SHA11ceb57c4b81f0f23500e118a4b9a225116a467de
SHA256b8443c289ad36568a2bf794ac9ec1f259a9dd930c36680dafc8d0cb4de81feb6
SHA51253522ad5e8e2a272d5b1bff9b9226b7d976d47413891c60d7efebd4365baff12b6891e3f79b20e14892ec7c654ad2d437941014290c428c6b1bd78a7b3e557de
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
7KB
MD56d857e55d995487273e504227cf58cc9
SHA1059fdfb08a5322f8c587fb2d86a7857ab7f310d6
SHA2569520a72d98434bc501bef3f0dafb83a3bdf40f108f49c65e050321de4bb8750b
SHA512fa6c2542b6fb2e14f61d97dcc25b8a545083d442c9c76d0c2cd799dc75458ae8cbcd5faea32862d2734e8f958dc0f59ec45a0a90c3074371143ca7701f562614
-
Filesize
6KB
MD522522f88193ff8492778e02f55e1cc70
SHA10054ae228ca53b6462cb83f0a2c91231fb29fa38
SHA25606e81b759ec91c637ef05323c15681173504b36db3216e6247104c05a96dbb93
SHA512f9e43ead57e41e07571d82f648eba4b731bbc6f42a945b8cb053b1cc797a86b1f111787b248fba358f45b896b7b330033d1cd0ed76f20067484dc396abd810d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53b574fc8efba36d68ec0a0e97c760cb0
SHA1006db310a72bb5496b31a4c7dc260150b8c7c3a4
SHA2567fbfdc48d55a7765c03bbb9be89e9482360c5f1e46a5a3ecedf9797c27d91339
SHA51285c607752c70060471dfddebd54597b6e3b58792d0deb58db1f28ed15a53892277415667463916b48877274565bccf6268a14013df778a1b2b1b6dc1db35a4f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c776.TMP
Filesize48B
MD5054d644b5bb5f3a5f9ca06fee1e6d924
SHA13d055b0f97621a0258b1953af9b4e336bc51ed3a
SHA2569b6349dd52a6da691b87ecdb532ae11b29cb9c3e81c9f079576ca707842a5d09
SHA5129d33fdc22b72194e08edded8e54047ebe88b90b95067aa07eb83e189e0c8e055778da598d4f554063cc044a3b44a90abb99d7907046bcf31bdcb533bfd05717d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56b3ec1726556248ae861d8d1e0302fc8
SHA13dedcdb3221e74211272d5080f7fe5524b28f796
SHA25634064c39ce5525dbb7793b638d12f1e700637a9c2fc5ae41ae24325e15a450af
SHA512a0096df5acebe2a8812ff5b228fa2c35a95e8aa93e5ebece6609641a6c5174160e5b533214e67c5d562a0881ac659c36541b627183be5ed63945d9658a974c99
-
Filesize
11KB
MD53a7bf06c7367fe8cf541baa55df43260
SHA1a81e02a3ae7294911ddfbe3a5bb3f7a8125f404a
SHA256ebd43e35fd5742feeed4466b4c84996852c8113f2edb7fa7071474b225834708
SHA5120ab96174024c57a10b1f9034288c983a3c9007ac99eed4f6e3d1840b49bb4ab2af983f4b235bc34de76196e4d5bb70e5c1b0ddc46eea3b60e6361736873c04b6