Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
668e176116613d533a02a653282a3aa9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
668e176116613d533a02a653282a3aa9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
668e176116613d533a02a653282a3aa9_JaffaCakes118.html
-
Size
110KB
-
MD5
668e176116613d533a02a653282a3aa9
-
SHA1
bb2e9d9c76a2c7911506b29ab28a29e8335138ed
-
SHA256
e5604389eaa25761028c14a8a40ee01532e81d41a26acc97fe5d29bcd06e2fae
-
SHA512
e3a73b9a056dc2d6ce60b1ef25b88fa15651f84c3f9f33eb8e983fb56b1085dce0254edd84d2252f95ceac11ccde5d2398799c477c9bdd86c9aa0018d78f12c1
-
SSDEEP
3072:IBrcbQUqHL9OQ4G08Cj4Di0mLcXmNRSpLFmC1TvoQ:+rcbXqHpJ88Cj4D7XmNROB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2608 msedge.exe 2608 msedge.exe 1960 identity_helper.exe 1960 identity_helper.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 3448 2608 msedge.exe 83 PID 2608 wrote to memory of 3448 2608 msedge.exe 83 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 4536 2608 msedge.exe 84 PID 2608 wrote to memory of 2824 2608 msedge.exe 85 PID 2608 wrote to memory of 2824 2608 msedge.exe 85 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86 PID 2608 wrote to memory of 1852 2608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\668e176116613d533a02a653282a3aa9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa970046f8,0x7ffa97004708,0x7ffa970047182⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1772 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4220704286966517996,2727421183155046940,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD574d22d9da748194b2a01537142c1c981
SHA151cb1e9b67603aeb97be1a6c25ef585060b94812
SHA2561e98f87552a30b7167610751188da3aaa84c2a75948fb5987de58e3e9adc6e5a
SHA5129e3ecf386c3b83fef885684bf746c9e6e6420b3006d1759de2422cf9b465a05ab80c6d3030edc104e2fa9c869eb275e097f9424d08f6d83796c8ecf900652f1e
-
Filesize
2KB
MD504a4317d5073cee64870503b2d472b6e
SHA1796ebeed7b2e720644c13dd2c6611e962857db63
SHA2560be47ff6a6cc0ce6d303782c3945001cf8b3634601d7f2990b8efe9e99d99f58
SHA512d8037368f949de303d2f1d75c0a48bab1462d4e432e2730810a2c5445b323f02c710bd0b43dc4fd499e322c905fc9a07c6da1674e0fe25b2626e3a8ebabbfdcf
-
Filesize
3KB
MD5867c0b646cac7f5e76df566ca671394e
SHA1119ba2fdf793887c4e9fbabb6910572868edc1ba
SHA256158dc72566ffafe0c58fd63f41f115ce4b72113cef15d28e7e97daddc0935403
SHA512cbdd33ab024399ae7750d076b3ef46610d913ad550898abde7722c5c78078aa871faad11b018f1c2e4ad2ca7009ecad02249f8f992eb00a2b65252374d387f2b
-
Filesize
5KB
MD505303054bbe64f5731a29bdd3e11d61f
SHA13ffc1a3018973e5cc9623390b47f25f3d630c502
SHA25664e2af2f4d3998cc91240759d064b5f0519218c7cbafd67f8900df8cc9563fc6
SHA51257cd5aeefe2cdc3d1fa5ecbd7dd72ae334b02b06fe330fffdd499c80bbd0c2302f96943a13aa97c973833f80a81ee8012efd65cc8bc115efcf57f3cf8c4fd4b4
-
Filesize
6KB
MD53918c25316846cc4ec8a17443339860a
SHA1e6724ef37467d63d2cf8dde4ad06cd66f1c9e0b9
SHA2567146f52f7b0b906568803e02744aa06fb0749adf9cc7b001964511515a737dce
SHA51265f76afae157f649cc239f43eda5da122ca1da854cb834afd2c462b0d6821b77465ada602c9f816d1293505df97795ed776486540a9beca6c8c2bf33633550e8
-
Filesize
7KB
MD5c4ebbb8bfca067e30276b0c012e80d9f
SHA1a4ba1a0dd79b44359caa6b029cd0289db165f9d1
SHA25607c45a0b928f876d78537c67d5a8bcb7e6f5e4a9d1b3b2a1141fc1604c0157d2
SHA512afe22bfd1b549d55321c079108d642828f03a499cade124028910aa521ce216b4b64d225fcba52d9a02e68883fe4e16b68bbd6a13eae18d324ab9a0556136d55
-
Filesize
538B
MD548f89d5714febb6ff04819fa243b18ed
SHA1b5ed2880c62429a65f4c1fe56ef6d45f1e033032
SHA25605d0f3a1b42837c077ac3f55b14436306aed24731781c10b52e9b64fc4e36cc0
SHA512f7ab5ec94e77475f94479053a2758157f965e3394580b904d9cd482fed27210d51df2f85d3a949c2de063b1ace78456d612901028581bc59bd6a73d78bd36b0e
-
Filesize
203B
MD50215cf51639e22f25c45ccb6d8e3110e
SHA11b8aa340d4c2dc23485e83cb84d53222acff4f11
SHA2563c112d61774619cd44c54c90b6aa0fb7be9b79cdf0abf463561f9be0f6bd2962
SHA5120541c34487575c308e1a4cf43cf18dac0abcd6c64e4fe5db6a3a0a1487c58c884b7653f712e776e6bc074cbe345020fc51af1e083957906478e97bfef4068429
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD55264cabcb835a6148095d2e3f2905d5d
SHA12bdc8b89bc180af4abf0a79edee9c6c4e1e6cb69
SHA256ab06fa10e6bef2a4f71319770dba97f50733a3d8d58795262404da682cbafb16
SHA512d140dbf6c6d6b2fcbf71e93393d48503842f19844e2c5fa23c1c7e753ac7ddbd0d0cf0747e5450d212568974ba1b5fcfc03123223062bd91d9a0d1d546f24a63