Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
370328615a0c7a57a2245fc95e2bc3da_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
370328615a0c7a57a2245fc95e2bc3da_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
370328615a0c7a57a2245fc95e2bc3da_JaffaCakes118.html
-
Size
74KB
-
MD5
370328615a0c7a57a2245fc95e2bc3da
-
SHA1
3f8228806cce1344af36d205c12c5dc4f632815a
-
SHA256
f27c752a9bede48f398e1b7a9284fbfaf9b08aba76db197fb502e6c4202b388b
-
SHA512
1b567ccb47ea67d53a8935c23a9d5a1b0944878b5a4543a69417e8f7c2d7fb1e51506fd44881061ec4962d0887155b7097ceff6d7c44165013f79b14291f3a6a
-
SSDEEP
1536:k70U3FF/7MdFwWWhY4I+eEfuqx/2cewY6iTzA7ENXSEb304AyffhhqA/r1lDEk2G:kD4A7EBSEz04dffPqA12uMsc5gtpvnpp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 768 msedge.exe 768 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 768 wrote to memory of 4356 768 msedge.exe 82 PID 768 wrote to memory of 4356 768 msedge.exe 82 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 2324 768 msedge.exe 83 PID 768 wrote to memory of 1556 768 msedge.exe 84 PID 768 wrote to memory of 1556 768 msedge.exe 84 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85 PID 768 wrote to memory of 5036 768 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\370328615a0c7a57a2245fc95e2bc3da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9053046f8,0x7ff905304708,0x7ff9053047182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1912 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2656 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,12639899213388971528,3909741409657929124,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5b226d5ac493aa1978650799ec4c3afa7
SHA17ebc8ac67b056c116320ad4e2466209a37c841e1
SHA25656aa475b8518e3c6aa71ddfb7774f2699f8119ed9ca068c6fb75757f02979876
SHA5125f2b16df5297eecd4bff366299b94c641d368f0b50756bfd2ba1171d78055b7002c6d55cbe9b3c56838ae307fcecdbfbb18337e8f899c872c835154f97a62d40
-
Filesize
453B
MD5efa6a3f07d28998801df6a141affe064
SHA177b4f95c51efef63287ce5a178736dd2a655f2e6
SHA256bcde0d7ebda196bc84bd0e67293169df80d9c1fa49fdb7a2215c20a2fed33522
SHA51276a9943f6936e7f5869366b2d6ee23fb1b2e80346803bb8f2d90b14634aca9665a5f76d4037b855f032af5f3d29344d30fc5f236bf9f0062ebe191c940317e95
-
Filesize
535B
MD502bacede1f43bf16eda36ad5242a31bb
SHA1812cf926667f11991c0b31b67f2cdba1280ddd5c
SHA25622ee649293c7f9ee1e524599d17bb1e752429ace230b68a09385dc10cd831842
SHA512a65b35a2f3a1f6bff7778e177e4c3991b79f43bfe1884ef3bde523d7b5e37d6545b6b15e852bd47285a15aca2849e8c100858f2c82bfe13efffc55fcb64128bd
-
Filesize
6KB
MD5749fcbfa97e9d983c011796ad1274cae
SHA1c93d1ae6a430f2a47e325bfeece33607e2997fee
SHA256733413417a8baf7c22161c82fa6126244a024c828526664c6fecb04f4f7c815c
SHA512ad8a04d83fa79c7f405dc71c37756076e7c437072d713c9c4b985d0e5a3f10ef250d02f05f2bbaefbdf51614efbfc5efea2b13bed690c07847ae0ec0269a5d84
-
Filesize
6KB
MD555a92d4b2089367585fd60a53a708e97
SHA142a401fe1401ebdc33f57e06eaa1ad6061bfee5c
SHA2560dcb90b0051ee96cb2bad20b1322bbe5f0627ba64bb4469ea202b64084de6c0a
SHA512d507227125575bf8efa6257e473f3531791e1b2170b102c0f1f0c3f3c60643e73d38321432269efbea512beeb7c9b5317745ac2ec85bfbe8d1f3199963f39479
-
Filesize
6KB
MD51493bee42c3c5323237144efc522f3b8
SHA11e29a545b35ff32fe742b16e7b704b42e7c378a1
SHA2567f624231b2b2bf5e0eb020b1955796ffadb85cdcb2cdc43b2b89772081b2b835
SHA51291279ce3c33f7c481edb0498503d07251ae5564dd6b1abcbffb29e13fa66cb0549eee7575aa42a82d407d0b3a7b7f54cd23514d9883e4d833e1753dade4baab5
-
Filesize
6KB
MD5906e54f2292c3254ca73139be3ff738d
SHA152729a147e857782695274699fa9ceb531db271d
SHA25652091412f86a128872c27b433112d40a803c82e905997d8b017687b41c2e0c74
SHA51237f3c814ef65b48ec5d681feff9678df171b4c6a6210f42dd9c8103195ecf7647aae08d386d26142ea6b21c4b90c0f00704c896f43b11db292b012d02d3aa319
-
Filesize
371B
MD53fd052719269b1af6c90e81de64b063c
SHA182a1e12694ab643b80476dd8930186f079e5e9e2
SHA256895f178b41f752a296c9d4a80873367bffa1e93157c24e8768ae5314e8d6691b
SHA5123fc0884f5ce43df7c7fee73d4eb6cdcd0a7fd91b708e685e4c09e4833d1d9e9676fb5cba530cb6ca71b1e708b0688138ac3ddabf0dde2ea8f8f15bc429316832
-
Filesize
203B
MD58042a4a3611656a07c84350e70b8b4b2
SHA1c9c035ec8976ab3ac1c6a5af0a9cc679ee03988e
SHA256c59edc451be04f8da591541f0522121bbecc931b539a4c709d3264b32e1de865
SHA5127246ec9b85ebd09e8dead5e7aac6e161a78dee494b1c4f9de943b919a1517945c396cc95731be2e3ab3cc7635860622f490116d738b44364d33dc4bc2ab36346
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD572600f617de1eddc11d31d04eb25ed75
SHA1cec266b8da90919e0f7cc2c21f2daf80f3caa87c
SHA2562c7729cdc4cbf649227dc52622d3a8309e4340bd5bfcda11498df450a04eb068
SHA51224d1c3bb56711a25b9103696b7fef9a4a0365cd8ab040ae27c17310aa9c9783b54e1a7debf9fbb35bd784faff05804b96fd1d4483159a5fe1e0cd34a1b225e6d