Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
3dd4d57b8ecbf33f485bac9caa608166_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3dd4d57b8ecbf33f485bac9caa608166_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3dd4d57b8ecbf33f485bac9caa608166_JaffaCakes118.html
-
Size
14KB
-
MD5
3dd4d57b8ecbf33f485bac9caa608166
-
SHA1
4c7c59c13d1366d59d6e366f602986f2ceef32fd
-
SHA256
c956e22ad6ebca5498e26cb56b325ec116f2665d1f771252f3648186433fb475
-
SHA512
9a53a0832407924bb79ddf7b6b17780817de98d336c0fdc2c84feea0ed7146c468f735112ce737a782acdcdab2ebb94891f4bd9da5f7e74180476104f404af5b
-
SSDEEP
384:CScOfdCSe2Vw4y4zkqJ3ZuHr9BeTylxYt9MU2V:FcOfcSY94pmHJE+DIc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1304 msedge.exe 1304 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1548 identity_helper.exe 1548 identity_helper.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe 1840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4176 1840 msedge.exe 85 PID 1840 wrote to memory of 4176 1840 msedge.exe 85 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 4996 1840 msedge.exe 86 PID 1840 wrote to memory of 1304 1840 msedge.exe 87 PID 1840 wrote to memory of 1304 1840 msedge.exe 87 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88 PID 1840 wrote to memory of 2512 1840 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3dd4d57b8ecbf33f485bac9caa608166_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff820a46f8,0x7fff820a4708,0x7fff820a47182⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,8274217200067114519,544231964165514054,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD50a30a7ce0f109df0f6ec24ba8519128c
SHA1b48cd63f8a822a95c5ec10d4f664977b487354c4
SHA256ec4748713eb9c1a47e2ed1fecb339677a49f570d8c647ce3f4c9c66157d7049d
SHA512e4240f484ae24032370c2afd4a707c2fb50bf28ff75af067db31255228a8a229ced0cc502709a8ef6b2ccc65fdde0f8c5c860dfcb27e4f140b22beb37084ce9f
-
Filesize
1KB
MD5cc99e8423965729e4a6726934d7b22c7
SHA112566cb5fe1c827e1cf7d635b0f047455ac0e5ef
SHA256be93c0300ed64a60c2b7c342056f03205560d9c4751d3a06aaba6e35c2b55183
SHA512d8ef34ab64253d8437139e9a64e2da75c76891a4a2bb5a5e6c8dd7b7d11d9f4c4ca9fec4a30186257f7d453220aca90005ace50e8b6ed67eeba2913d107d6991
-
Filesize
6KB
MD5b34ca0d4bb627817a903620f699496d6
SHA11ca2fbaa66372407fddc5de03bf341bbd3f822bb
SHA256d641aacc2f0fb93aae21d284fc31e3c37b9eff41c71c0298c6954f2645a81900
SHA512d1329ee15191e749b675edec4be21f42c65bf523aaf392e4321f29be05edd944f9202c4ebc1b4e728751eb3b199062700e9ac77df2dd2f1eefbc0ff2929671ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b4663e6f-e355-4e48-a9f1-8d7081accb35.tmp
Filesize6KB
MD54b93ac431278fd82564ad5211b05f596
SHA16524aa073ca2ca05d06d924d05ea23871f787d5d
SHA256ff3c89ca3ac60ec3ab5c083384a7512af0cbf99af3fb7a0109c6109489123d50
SHA5128c339310d4f6f2a72db3a4a277c876a80a42f4b2bc435e9222a1bb878c0bd95e0216813b5088fbb56ba32dd9d544e9a96636655cf5420b89b7f81896497f5dea
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d3062bfbabf5325bf42b06abbe7a45e9
SHA1a608e12d3cb5d303e24f80884683bfd3857f96ee
SHA256697cb5a0f9260161b9c4e8dd929887ddb46471206ae54e8ac297a598c42662ac
SHA512d0dc633c119ef5f34876c1dbe6ce79d9a6ec84fea54b89de46c11ea8e73d8a2198fd5e242b95b7e06a34911e95bf4a4285477ed8a19e5bc92f45661ccf64ece5