Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
10523ade0f90f60cb4fe9dd99f94c89c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
10523ade0f90f60cb4fe9dd99f94c89c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10523ade0f90f60cb4fe9dd99f94c89c_JaffaCakes118.html
-
Size
175KB
-
MD5
10523ade0f90f60cb4fe9dd99f94c89c
-
SHA1
89390e394f572d9d984513fb51ea4aeb22c2376d
-
SHA256
e7077008f40278ada2cef5ad8b2f079fd99ed45fd7561b75da4f6469c3a71d8a
-
SHA512
89fab4f2a3b46d139c7554a3840b05e6b9b85fcb2490c7169851bc50a3140c4dc0892058702f5edbaa58de8d8cdf7e0be6bb68ab093044822c1dbbfefb8f3cad
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3xGNkFLYfBCJisZ+aeTH+WK/Lf1/hmnVSV:SOoT3x/FSBCJihm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 2988 msedge.exe 2988 msedge.exe 4120 identity_helper.exe 4120 identity_helper.exe 5656 msedge.exe 5656 msedge.exe 5656 msedge.exe 5656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2580 2988 msedge.exe 83 PID 2988 wrote to memory of 2580 2988 msedge.exe 83 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 2028 2988 msedge.exe 84 PID 2988 wrote to memory of 5008 2988 msedge.exe 85 PID 2988 wrote to memory of 5008 2988 msedge.exe 85 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86 PID 2988 wrote to memory of 4816 2988 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\10523ade0f90f60cb4fe9dd99f94c89c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc041c46f8,0x7ffc041c4708,0x7ffc041c47182⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12561566990561752606,12328000510328589318,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5ff19eb611ef19a5ac4afecf21759c140
SHA12c49a5f6dc7e5adecfcf63370edbffb06a2dc832
SHA256108d52aa9f90ae42a9b2b08fb6b930516f6f88e3df94a39864743c5e8e8746c7
SHA51283c1649e4f54215079fe99df7d01a0b7b62b48815ba0720c6591564145bf374a9cb70320d672f8b7e42db0a9f5ae15cd985426e700a98cc468254e1dcf1683c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD5cb4fae8c29e260871982e3f344d65268
SHA1ab15c16e1fbe6ed137e273aed5a41b87638ef02b
SHA256f6fa8901501438da72fa6af3db04cf53c5bf2c9b4f7d0bbafc7000e6f6ef2616
SHA5125b9e10fcde8642ff255ab6ad3f96f53f8e986452918f836e1fa2b89c659f13ca602f6ec2a94f03fd34865ff515825de41463e0553465b906cec4df1c79cf32a1
-
Filesize
2KB
MD5bbc2e5ea41cca85f94d99914c23ecdcb
SHA17785e96b35153dc8dd685625eaa5ad8493153402
SHA256e02362edac9f9e4c914da95453829fe51d47441020aa1184eb96ff661e323820
SHA512ba5eeaddea395a2f8ca7a4c96de4ec4c3313dff6bd0819d4e77699feb276f6881468a50bb97d65afacd8362db9204feac45f7e747fc1e3b8b0b49a2b952403a7
-
Filesize
2KB
MD5124161aef6e4b8b82c3a8120fd0f1d18
SHA1f9335c49e29bb4cf66caa10d76ed4535be6b67ad
SHA256397caf3e7a887e32f4d8cc4c73d230129a3b36d0dfd8e49e0ab617b38616a701
SHA51218e193934713cf897f39f7012938a7798242680b82a5afa1e8c136d8713c97e7b222ce6a22d87271f9e670d0612f28e6269bfebf1db332643afccbff2971a32c
-
Filesize
5KB
MD53e0a20f5a35eb9ca28bc0023a00b20b4
SHA1c054d01e6a3ccdf07b1cfbf67b755e2fdde80104
SHA256db80317c35b867541554587ebd0ad535963762cf4f674159787f805a696bafee
SHA512837621d1f3a68ee1b78346934d9ca321cb335eaf4741bc47dab2eb466274ba87c8b5d445390ad4c3e4cf00f9b1461a6c7248792fff105f3e7fbab767699095a5
-
Filesize
7KB
MD5b1783f059a1aaca6d0bf757cce7d70c5
SHA118256ef3645b94d6df5eb78117d981f530410897
SHA25697920465982679004150305b3e7b4ed30bb58ad0acb1494edc855621fa34bd68
SHA5123db226b9d13164fa9ad9974818142396229d57fa2e48ea03dd64149adfb9f8fabea6778c2db96d773593967a4847a4c6e2eba1cd602dd54defff810a6cf0b0db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e59a9840e9981f4d3453d51cd0ac9303
SHA17f3d98c60a23ad67318a2b7b722186137c833a50
SHA25639ccd5daa0b150043f4594c0347127d2a25b5be856da085e5edc1898057bca3b
SHA5121aaff185cb41106e0bbf1d0f7322bb0d4e7e87e719ab6f572afa1f88e436334c0200259cbe53b3818fa1af73fd2462965c299354368731ff9f5eabffa7af9ca2