Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
62f431993f051f28ce416fa0a6da1116_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62f431993f051f28ce416fa0a6da1116_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
62f431993f051f28ce416fa0a6da1116_JaffaCakes118.html
-
Size
41KB
-
MD5
62f431993f051f28ce416fa0a6da1116
-
SHA1
eaff0e8ea0e01b825dc20d4b66605858a4866fb0
-
SHA256
978e8e5aba0e31195ce8d4ff34d44793e01f24456fc999e3ef789e328f6b5d69
-
SHA512
b996d1bd371fd289e4bfaba932504f0813825de90f77c98ced19ff460f07cd91ae8beb180ce67790b735c86477e76dcfa6edd7ae2858cf3616cc22e06dce93fe
-
SSDEEP
768:MpTQWVloMMWsH9P03GvwI1zn1uoZQZRG2SgWr:3WVlxMWsW3Gx1TZQZRSr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 1124 msedge.exe 1124 msedge.exe 2524 identity_helper.exe 2524 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1480 1124 msedge.exe 84 PID 1124 wrote to memory of 1480 1124 msedge.exe 84 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 2588 1124 msedge.exe 85 PID 1124 wrote to memory of 3556 1124 msedge.exe 86 PID 1124 wrote to memory of 3556 1124 msedge.exe 86 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87 PID 1124 wrote to memory of 5112 1124 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62f431993f051f28ce416fa0a6da1116_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff966746f8,0x7fff96674708,0x7fff966747182⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7156 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6748 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7160 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6948 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6988 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4008034576682266604,5650271033177996529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6688 /prefetch:12⤵PID:3092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cd8be968db510eff8ddf3d9ec37fb6a2
SHA19734f46fb47810c6a5423bbfc5cdfa4bb1af36ae
SHA256341e00971e46b1f9b1b364ea7de8f2dd51b919f15ea99f6c2b1b36b8e84fb60f
SHA51282388f2eebf70722cff19a6fbd186f6a31f84766f2f6ff9bfbbe293ab91637fbb863f822c3065608682b53479645c69230ec10a2033cb90e4c0f2ac82675c6eb
-
Filesize
1KB
MD55451c0aa6541162bb27c6eb9cd671493
SHA1052881dd4743fe03900959aa2b334483f75e539a
SHA25694577339427352b6ad0fe38802d6aca18936a4298380ab2f41a758721a3a5e00
SHA5124022ad880ee0f16d9908c6a4f32a6d47253402f60134f072e175e934aa6d6271a81dbd3586fd986033e36ffa6e562fce18d6995888ab8dc68880279015979121
-
Filesize
5KB
MD5e433c86daf9b9e1847ebdaa314a0e123
SHA16ab9ecd90629603d10de6abfdf49182611e66609
SHA2569c287a784d942e751cd91fff203fc589bd7c831068366074f4e94ace6b4874da
SHA5121ee2372214c124bc5725f24acac618e8296c61ba54c2bfa161bd8f24eb775b03afeb6e43b264f9fa6bbf8aa2c9be40680e066c00dd1ce148a2a3546c8209e2cf
-
Filesize
6KB
MD5dd8ae7a258c500d7546aae1e45114935
SHA19584ff4e5b7bdef98f489272fd20939dcd5a6c72
SHA256133ae8e5a300149aa218ca13acf5316a8d226d66487e208102a0ae6532172c1d
SHA51228597dacbba57eca34a4f5bb4dc731b88605a66112fb5e7558ec5bbde4b9633727ece16c7d49a42d76d779a5f97eb9d769bca38b48e874c5ee4817734b9dedfa
-
Filesize
6KB
MD5a5c69809ee4106a7f8b180eb941f56f9
SHA1afa810a95a560b5fdd5f29da0a79d84b7b2e3c66
SHA256f7731790fbd04a5629231f47030d3c5969b00c33323ab322564bea700b64d764
SHA512368406fbcd62a878d5087ab7405313eb137b8d4999bf7971702b0e72c956126e250abcbae59e8b59cfc1e5cd7620a408d813a8fec9aa4dd6b2d3acfc590d390c
-
Filesize
6KB
MD5c992cb8778a2105a55ec577046008cd7
SHA17193c577ef3d18a8ff373f6bafdcf4fc2a81a4b3
SHA256146f6536b3f4b68ea0d334a575f56ae1ae7b07e28bb4568f2ccf7104c841358c
SHA512d3943f6bab734b69ca4016628f30c58c1f4cffa0f09175ab82440ccd3a1486c33b3d1e9d10afeb243504bb5d158955a651ae450bd89deaafec68f1b8cdd1a8a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD58fd335f05d3af8201a31303dbbe049d7
SHA19c8a149a1a03c47151a5773c20a23a2c700e971b
SHA256994d01c937c54bf8322f898e9ade58bdad2e613640c6f9efe5304e487708c686
SHA512cac7fbcea0b1ea474cf9409ead3bf275d62840f7bc401b8e7acb3c22e1e39ea52c4f3a396825b6712cdc42209b751db0d0cddde20180a52223a4187a13a8d694
-
Filesize
11KB
MD572aef547999624057ba8ddde923fe5a8
SHA140af2c0f0cd8acc2b553d198abce7a68ecf8b806
SHA256e34f66b1ea63d857303cb39a17051fe7574957d1e81efe22969254758fc75f5a
SHA51235cf14025949fdeac416dbc38124c8dd982c5ca755e3dbf69b3a2f0d1bf06e572c175eaeb8654750a58e834817f839496292ba9c179ed42c83334719c86a51d7