Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
9a67e348d49fc8c76d707b47c1d4215e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a67e348d49fc8c76d707b47c1d4215e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a67e348d49fc8c76d707b47c1d4215e_JaffaCakes118.html
-
Size
28KB
-
MD5
9a67e348d49fc8c76d707b47c1d4215e
-
SHA1
c5d93e14dde4af53a239fca9ada2b0eebaeca613
-
SHA256
5d8cd3371f2a90552ecf391fbaf0e6e8abd4384fb0bf17c33d0137f087619c76
-
SHA512
9d104e4734a6ca259e1f31d4d3a3433f85c173467f6c6d2f900838f527d3b0f6fcab10e8e291618afca7119e22ce3ae9d1cef98c29a0028a5823a7610d75c549
-
SSDEEP
384:LDYIAteubFNTLtN60kYQuIftXdFGpRD5VtwBZmPjM+zKKX:vYIAteiPLu0kYQffhXGpYmPxX
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe 364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 364 wrote to memory of 3332 364 msedge.exe 80 PID 364 wrote to memory of 3332 364 msedge.exe 80 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3108 364 msedge.exe 81 PID 364 wrote to memory of 3392 364 msedge.exe 82 PID 364 wrote to memory of 3392 364 msedge.exe 82 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83 PID 364 wrote to memory of 3456 364 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a67e348d49fc8c76d707b47c1d4215e_JaffaCakes118.html1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942d846f8,0x7ff942d84708,0x7ff942d847182⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6944 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6944 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7123133814692677144,17058106151738974113,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5076 /prefetch:22⤵PID:432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5285ec909c4ab0d2d57f5086b225799aa
SHA1d89e3bd43d5d909b47a18977aa9d5ce36cee184c
SHA25668b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
SHA5124cf305b95f94c7a9504c53c7f2dc8068e647a326d95976b7f4d80433b2284506fc5e3bb9a80a4e9a9889540bbf92908dd39ee4eb25f2566fe9ab37b4dc9a7c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD
Filesize306B
MD52f9d6381a17d64ddc82c44c7db2cf452
SHA19ed8ca696f4e0e6a29a5fa5c278be7a1692fba02
SHA2564290631181e09cd2b32a29e4222f974fef741a35989abbcf108559356147683b
SHA51221fbb8252e311588394d8dc854765c22dabb91b3090336f7e5ac871017093c3bbe1e5a16c858ba0a39d12296ece60168cdfb7f8c1fda6ba9b0b561f512eb0042
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
66KB
MD50fe383a7ddb9bbaefc3105b3297f5583
SHA1f80c9d789f251909c7560bd91a9e1b9a10c26362
SHA256d7ad4aad4e48174c30ef21fc32c9380659d2c99a5c39680e10ed9752139d8683
SHA51231de1f59377bc76e5d602d02273867ce750bbbccb7edc8f2803c0188002ecae6752ac3ec31c2108e64b0d871b01e6a8a06711969dc68bd9823303def0e7c1ee4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5132d9f1b5a30118a8a5203ea1f2d3858
SHA146ec1fb024d9bc4ee0a6a0c6e0b5db1facfc02f5
SHA2565a8beeffc0b8975d17d4d777129dab41c1062b134d12b808c88768c3bfa532b8
SHA5128a7f1bece95ac5a3bc6b573764d4f8ccdebb5e67328c133f31f7ddc6a45236d54ea7a5a628de1ae314a3446ac9491af55c3e2eb2fff324bb80575f57df2fd579
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54db32acfc23f5d646cdf2be7aa1284ce
SHA1ae58c97045a963130297195135b71b8441354012
SHA2566b78fb8658aab3b3afa1e605e34936fd36450f317a39dd04f52ea2c238836f20
SHA512b99b9d305e0cfb38925895e701a38831253ffd6fa19e13b53c29911c406d66f743852984623c7cc07ecde26ca184fe7ea14db06de6c28487e280568856dbff9d
-
Filesize
1KB
MD5f9f44e27136857a3d426422020b00c83
SHA1fb4f7c4c717e6f7040ac51b87acad652ff2897e9
SHA256c9bed0b6d14ea7ead79d5ceb5e3758f50ada62500a6d0f0914a97b99b63e118a
SHA51272ce88019fbb6036c81eff0bf7d395678f156431829da920685ddbf449d397aeac317081faf2161401982d914dbff75355dfc1fa7d871de6d27e127a62455ffc
-
Filesize
1KB
MD5970ec7cb63b2b35b489ca53b32eaa117
SHA1ae84763a334724dec3a6b71ec302d49bfe74af4f
SHA25675572861ceb74c26f394d3f1288cd4d28301844d9a6f8c126dd94c39b0a681f3
SHA512f078c3ed5f00ee4b864824f34593a820577841c13a31fa7d9bf8d64e57c3aa5074b695ed45ff7ff849d5775de2c880c1f2a5dd93a42453586909636f5476e785
-
Filesize
5KB
MD519317bef3de46ad551354c077cab1ec6
SHA1d3bb79e6f616253e328a4a7dff683897eabb04ae
SHA2562ba02ec028d46de1ad9e5834ad4997a6263791bc6bab64ae9835edb4c73eb617
SHA512e7bf5e473445ddc8ae947b2fe5117fec94de35df3eefc33898d1c26a4b6c825fec430848ff43c0d8ff6b6921429fbd9657ff8ec377dd3ad277c697ff511f579b
-
Filesize
7KB
MD565188e60e403e0666f5fdb12ac091991
SHA1faf7f1619001820c18df3b02be053e7a88be2d1a
SHA256d9bd857568c21111b73d4ce3bdd6ddaba4ed4dbbf3fdb7ac96863328577c929f
SHA512f44fdb203366ca2f764f08652a3a7d2fa1da24a6d441d571d3f46ef5e71d04b1c12494047b54214677c5f931e945f99fa0acedd2a82b6cbe04c7268e4424c5e8
-
Filesize
7KB
MD5edd6812bb8c2fd780eabcc03b1f1e03d
SHA1c416a2cd0892ce569cb18f763eb8e410dc62c569
SHA2561437f1d8a087dab8b0104c6731566af08e5fe9f29a77dbc4266c5daad47d593c
SHA5125ee0679a80f7b2d0741e9e84c5a381bc83ed6a534d592ec6c2fc319e5ed1d0b5fa5599a4547df9d604baafe7874ba6824a5acba1c528a6eac321ba48169dbb2b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54af9b54de47ceeea1a40a0c64636eac4
SHA10a55361a0d6952e6429b84e34d9556e69a7494f0
SHA2566315fb89141fa7a72420230d89e8c30fef641c5bfc72de80e2b4b31deff33583
SHA512326f78abf8bd6115c22a3cfbe375a04ecedb67faec068691d397eb0c48c7bdae03c1067f37a9cedffefe0546b39020946b402874a40598fdc10eeb61b9f5d236