Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
5f3c16baec3af64483ee4555c6223851_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f3c16baec3af64483ee4555c6223851_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f3c16baec3af64483ee4555c6223851_JaffaCakes118.html
-
Size
175KB
-
MD5
5f3c16baec3af64483ee4555c6223851
-
SHA1
83c7c50999fd80cfa64831dd52768541d48443db
-
SHA256
9ab5c7cbb73ffd9a355577b74e040834b08accda598a22e49df5d358be6afc5b
-
SHA512
72fc942017bfc6627d06190b74de402c40edca1916d5f8521e905db9aa55efdff7f6e1e50a4cb50c3ff47ca2cb3ec1031e9d264b816dc8dd8db568385ac4b5a1
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3UGNkFGYfBCJiZW+aeTH+WK/Lf1/hpnVSV:S9CT3U/FPBCJixB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4140 msedge.exe 4140 msedge.exe 4868 identity_helper.exe 4868 identity_helper.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe 4892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 900 4140 msedge.exe 82 PID 4140 wrote to memory of 900 4140 msedge.exe 82 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4300 4140 msedge.exe 83 PID 4140 wrote to memory of 4660 4140 msedge.exe 84 PID 4140 wrote to memory of 4660 4140 msedge.exe 84 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85 PID 4140 wrote to memory of 4076 4140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f3c16baec3af64483ee4555c6223851_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e53746f8,0x7ff9e5374708,0x7ff9e53747182⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17049217858198788652,14030720805507221538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7ee386af-eceb-4cd4-8670-a6e6af2f29e3.tmp
Filesize2KB
MD5be75e8fcbe87ee0921f2f0be169c8779
SHA1cf7dae522312a0af8b79f4c9b78deb9aff61a162
SHA256ddc19ea6d4cc401253a85ec1dc2e8fb93140d1e65d2130d110e249b2f272f387
SHA5121a3d130c7a870aa8dbe431502b57d2345c22d603e349a2c81f2ee3e4bb76f35b429c5387c94433464b77e852725c7e00f1ac531e11ad33cedf86389705a5f36a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5b5d62260684e5cc13504d22559cb47a5
SHA1e73fbdcab4a8703fd22e47b4b04f30a447793ea6
SHA2567a631cc3618d5420ec7bd8faab7edd70b4c15073e0ada0fb533a93be5f9f9142
SHA512e201cccf837a375cf5df0f6a091ed1beac098aca4a8f9b28779bf8f5fe944df16ee7c58482a995f1732ceb9feef1214a70ddcfaceef0b595a0112e284298c57a
-
Filesize
2KB
MD574ff3d7da8a3939efd097f1fbf2cb05c
SHA12d3b4358f1dcc19242207235458f62d47d2ea40b
SHA256362f5d1d5fa73ba568548430108d6d27bf4e48f352c1be801d68d628efbf8506
SHA5129f48eeedd131bc23d60bc1d1e822c58a9067f59a50b9b9b0e9698e82775b1b6106044a7bd675d8e6636fbc15166f5969e7edefc29b3c532c3c7570cd1fc4f862
-
Filesize
5KB
MD594a4b88e21adf46c2b5b5fd6a1da16e6
SHA11162dc6335c7e0243085b3e019c25d5b1be302c6
SHA25690f532b11c06fc2ee6c0c9311fe1e48518946d008334c925116b534312479f9b
SHA51230d0c86fb4a6a88378f6098ce2b87976071d5cc163c0d69994643e860a6d861e93a98b58299974277c5baa9b3910650f66d74e3c47773b072b10a1424ef247f6
-
Filesize
7KB
MD5c14e294c54e6671dfeadd144fc1a8a42
SHA1d762c42a5dad3353da3e93e5124fff0c80a2a0af
SHA2566cf5e17f6adcf84a94070eb95efced99ed066aa03979d5137ba3c720ededf207
SHA5125b9f3ba6141e5e9f8e5561a52f28aed9ffb2233d3872fa2f5a19855275917bc9222a28dd606965c8ff3aa37b3f0aa2739ab62b7bad2076b5a5955fd55f12abf2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD57772e39aa739fa38f94328829382023b
SHA1dec48a64ab7acf9a4daecc83f2b312e524a39c83
SHA256a7fcd39e1eca3e11473c308d71785933207ace088ffc37ada13b850c892ef6e4
SHA51299374e66febb586a1764795079d2c9f491f611744c14834b7b578ca56f3baf568a984cc2aa3e0cb409c87a37452654accf7e7c14c6e639dfb45a896e01938438