Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
5b76628472ca5fb07004cbcc57a44075_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b76628472ca5fb07004cbcc57a44075_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5b76628472ca5fb07004cbcc57a44075_JaffaCakes118.html
-
Size
79KB
-
MD5
5b76628472ca5fb07004cbcc57a44075
-
SHA1
e589dd1463d83e3934a9f10fd0ca1527e86592e8
-
SHA256
080c2506aeec58865f68665309f68cc0882a35cb6908235651254202142650ba
-
SHA512
683c0c2cb38316f577f4aa9f1b10fa1a9036b4264e7655aee74ac31363c1c4aa229a62bd8e24456a077119834c3dfc582e8a73133aa1c8b0af2092e2cf601363
-
SSDEEP
1536:zg81uumdM13h3lr3AMov7KE55A5GI8bws1J:4NdMJ1lLVov7KE55A5Gtbws1J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 624 msedge.exe 624 msedge.exe 2992 msedge.exe 2992 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe 1844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3580 2992 msedge.exe 83 PID 2992 wrote to memory of 3580 2992 msedge.exe 83 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 2712 2992 msedge.exe 84 PID 2992 wrote to memory of 624 2992 msedge.exe 85 PID 2992 wrote to memory of 624 2992 msedge.exe 85 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86 PID 2992 wrote to memory of 2360 2992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b76628472ca5fb07004cbcc57a44075_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff05446f8,0x7ffff0544708,0x7ffff05447182⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1944,15781447636171882147,6102476606793144572,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58c05b88d268aa713f80aa42505a74ad9
SHA18d9a464064e83398f2eb641678793783dd90039c
SHA256b65e436ac5694c723bb0224ebafe78a943e8e9a071cbaee836ecfc666a974e9f
SHA5123a1aa96dc2adb552ca649799f556d3679afee31db4aa8cbdd0d9a4f683b6425b0f725a5fb95108c9c327878690c80a3faac97c0811cf43ef6a20f8ab5c6f8085
-
Filesize
1KB
MD522577264f2bfc0f2f17daccaa8b35895
SHA12fab2a91567f31f075cba7b9d744678fd0af2eea
SHA25646a8069e49fe275c77179ab756db8c44fb077e7c0a5ac992b2abbd8524e788e4
SHA512a2b18bf6a139aa8eb673f55c61be814764b2aa7379f3b50f5f7af46234d909a355d99b9f1de953c18ab61067760bcd6ee639e699fdfd955c1763a109710e40c2
-
Filesize
5KB
MD5a0a523fa20684168893a1b0a727c9519
SHA1c15b9f88a16786313d8e5497f8b7bd9f9efb2761
SHA256e3350c8db9381fc6b2e3060e7433a3a1b88be23fc050421bd716ec59c8bde2d0
SHA512257314e79eeb3d853e8fe1d70326db3635319fe2fe0d033b92a9fa316f5564acd88c513d48d1d982473744aa1f43e4555ce5da4cf855f01ad8916057263ba4d2
-
Filesize
7KB
MD57d1642f0fefe3a9cab4a33376aa6eeb9
SHA13fb81bab3f7d40012ee1df2bbaeddf13ccf8ed6c
SHA256990cb4789826129affcff55ebdc8e029783b1268aff484f36db32a87d338496e
SHA51298d9927ceab48e44b2ec7c5525b6290ae1a8b18b0685614803ce82e4d4c70de0a4c6eb3148833921dea936095b69e64215b1aef6af22b5ec93835fc877e8e22d
-
Filesize
6KB
MD50a906d7fb77c37f85392cf4448bbd117
SHA147e1e4de026b87dcf0268a1064b0b946c8f1c15a
SHA256eebafb675e0c46be8bba56770bcc76943ef9109ae00cffa4709441033e4d3e44
SHA512542459a75c52f2d1a52f8517c7415ceacd6a5ed2267c11e6c655c1c30b64ddf7573ab5081d6c36f2df549064e658baeb5017f23346f69dc07dc5f6192522cbe9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d912f61b10f66fd97af2da764f87b9fb
SHA19d96d00c5f70cd51a466ccbe55178c620134c4fd
SHA256b7136c58f1efdf9effe1d34bb6a2d3e87997283d3ed31e656717c452fef948a0
SHA512bb731ccd99ba55fde25cf4bd971b59dc777ad01d13d35539b65b9b6bd9c77d5847add668b37f1d18a90f8e3df31b88574a88e380c2d2675ba07d8555931e3fb0