Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
4f4a94c315ca2f2b5d841d4d680092dd_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f4a94c315ca2f2b5d841d4d680092dd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4f4a94c315ca2f2b5d841d4d680092dd_JaffaCakes118.html
-
Size
254KB
-
MD5
4f4a94c315ca2f2b5d841d4d680092dd
-
SHA1
c38b78f27cbfb5a8435cbc90e3e5f34fdac892e6
-
SHA256
d7975592c8ac6bc3295c785069c557994726b2156dcad991af32afaadb8be6e8
-
SHA512
fe4786043c5537bd6828fe7c8467dc4928d2d43938a506b10492a93ff3957d8c82c0a1e289c77a0f86ce96d374b248bbc165925eff70e8b37a20255cc0c45adc
-
SSDEEP
6144:MeuAHAOokyBGBFBQBeB2BBFqJjxBIa5IVz7ESXXDyatmg:2AHA/kyBGBFBQBeB2Br+mzlye
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 sites.google.com 24 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 880 msedge.exe 880 msedge.exe 2648 msedge.exe 2648 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe 2648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 212 2648 msedge.exe 83 PID 2648 wrote to memory of 212 2648 msedge.exe 83 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 4380 2648 msedge.exe 84 PID 2648 wrote to memory of 880 2648 msedge.exe 85 PID 2648 wrote to memory of 880 2648 msedge.exe 85 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86 PID 2648 wrote to memory of 380 2648 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f4a94c315ca2f2b5d841d4d680092dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272c46f8,0x7ff9272c4708,0x7ff9272c47182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1892 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2584 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11795009086203947731,10354564210139273456,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD560006d966492d308a418d105fe234b7b
SHA1f40f038a63d2f429005bd41f9f5ae560486d4c84
SHA2560335b1ffd4d53d6ad6025a077e8567e74648a280084871bc80108892a552fe02
SHA512b34f12248f4664f2b0896e828045e33e8f4528f63f4f02513570fd62e1f178a0fd61b34237decdac27a46adc8bcb013ad3b33fb839df4880c888fe57e4ef15a7
-
Filesize
5KB
MD5210bdc41d746ab361af4e87bda0a9fbe
SHA1280af1639353a4834513fd4e690b59f0e192710b
SHA256c7b23c583dc0b6ca9df58e959e0333a406631c350d324e586e01df582727b3a5
SHA51268ec8b34456ae12e8ec2b0229c9d2263336d2337223d06bdd643b1d91690ed838e15b1b76121ed6f6a2606196a98969136a9e0ca7d2dd66d8cadfbb50677818b
-
Filesize
7KB
MD5a6250fe287f82ebe1c03751b92caeab8
SHA1258795d3f420d004beaa333545e86d493b1398bf
SHA25662c70c320956f3e30580e08dd3ede302671271587fd506e3a00d825b82a26612
SHA5122c90c035b6c8ea934e0c986a1d56ee4d49fefcdff47a0d7992e3dabbec2e7d54af9581e1ec19d05a1a9c753ed9ccabd85c3fe53a0e097d97de64ea24812c49bf
-
Filesize
6KB
MD5fb144f7b9304eb98fcdab197101fce66
SHA1f2d157ab37dfd06bcfca96396dd323f7c77f9277
SHA256693c7797340c5a1b1b68f3d68f126254a29f1f2c24fc683e39941cd5069452b8
SHA5125bffce4b5103bc964f6155f3f8ad5025d42f24e7c59212e0f7dfebc5b26cefcfdc2447fd8f56f29229a9592e49fc4d70e9ddfb7effddc5ebe2efdf9c23baf047
-
Filesize
7KB
MD56e982a10fef45671599d0f8a6d687b53
SHA136bdd076068bb28a948b1436eced10666376cc91
SHA256ca558c29f2804a2380a80577a17510011fe3d080ff38c152718a2b5232fde806
SHA512332b3a5436ce0134fa1f00ed563535f90363bce9d19ad1a86aa5b53bd067b6b44f3f6a5d6003cf25193f92a864dbffea1eb2819ea37592c60a74bf2f9fd20b6d
-
Filesize
203B
MD5255a9ff6019fabebd278bc0bc475428a
SHA11b81498f49bdcbfb8a8c7275f63f5b74bb54f4ae
SHA2561b08bfb6a7a87e54a0d20b281d4d59a6f85ce449424bf0e5f32ae26bf7363876
SHA5126e617155e5e37c6a3d34f2f949a7a1002a3b75ef9a78f14b2b4689bccc23b93435d1441badb3da9a5ae34bc533d762806bd1819340fc2e40e0b045c8e2231080
-
Filesize
203B
MD5b664d55aa7bbbdc92e06cf74f9e8258d
SHA14a0743dba5d685748c2596828f24726f25c4ab57
SHA256f80f323e38fccb8805cfeb1e752c414a59de23a882ffba60d0ecc71385058b06
SHA51236afabc2ebfca0aa621f4b0e85199e6b4d486024f333a352f197808a6af710f949aa3d38dc310c481adabde91e267d928b333b1e559f31692ab5423b1ce0aec2
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5df9e780a2fd91b2e6c9b1fc89ee4e9fc
SHA1c4443313ee4bb9649181961e3439980b871c0fdb
SHA25693e491db0d3b0738ed7519db5047fd15f88c25d6f140afffbba4e6874c9e809c
SHA512677ac550bded3c46f4467ec93da507f0236871d893c02b34aad5d2ab49137d7746e34024e5d35db08b2fa6cea0251f363d90bebb4af814e29703052ecc8ab1b2