Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
79d2a2ad29a1a0b8c338ac3bb6ac95c2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79d2a2ad29a1a0b8c338ac3bb6ac95c2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79d2a2ad29a1a0b8c338ac3bb6ac95c2_JaffaCakes118.html
-
Size
52KB
-
MD5
79d2a2ad29a1a0b8c338ac3bb6ac95c2
-
SHA1
8f9f2457fb07a5f5948c7d0cb5fb8aea9f7e5f14
-
SHA256
7a4e57bb5de283063d0d078979ce8d47790dc9bfb023f2cac3318ad903a33b06
-
SHA512
0dcac2844e1dea0ec05e061e531d1f7afbbe6853bc9388b7711422a9ed94c7d344741e867847f47188a74db9475d8925f69a355ad53073ff60267a4345676fda
-
SSDEEP
1536:3igi/fwbrQNzgL5V56rtzRgOqy8nwE/BszfQWW/iTX0jC1:3itfo6+5KrtzBqy8nwE/BszfQWciTX0I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 4400 msedge.exe 4400 msedge.exe 2544 identity_helper.exe 2544 identity_helper.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3712 4400 msedge.exe 82 PID 4400 wrote to memory of 3712 4400 msedge.exe 82 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 3868 4400 msedge.exe 83 PID 4400 wrote to memory of 1280 4400 msedge.exe 84 PID 4400 wrote to memory of 1280 4400 msedge.exe 84 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85 PID 4400 wrote to memory of 5464 4400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79d2a2ad29a1a0b8c338ac3bb6ac95c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a4f946f8,0x7ff9a4f94708,0x7ff9a4f947182⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6880 /prefetch:82⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,17884322435768288841,3448614114773004928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD59fba37bf61bf94b9bdc8b4e014cb4d4a
SHA1decd2a473b34b84245844891eb4c71ef500d9366
SHA2562c7aa075230ded8435152c003400e206e980ac6a6bad68927b01c218eb24d3fa
SHA5124c91c45fdce461f60d4b5f04090d2694febbfc434d9fa60452a89aaf4f8d059faf64bbf69ee67de4a30b4307617d1e4d20550f9794754cc7c8c05bf6c0e19737
-
Filesize
2KB
MD5d267e2f3f7d269ea957c142b1227d730
SHA1454561a30a376ed6635a0ea9dcfe244b3c4e915c
SHA25683d22a035358cde48cf5a42094abdce298eaa91a56d6e47090df53d3f9248ae0
SHA5125a35d7ab08b8339eb99f096f2bd9149ea67c2aac460244211307a465283045a6a401a9e603976e5610670b96bb7750d453da5fffe8f04cbf04bc922d35e8e5f3
-
Filesize
5KB
MD533ab38577c573460c1d22fd6fe0ee6cc
SHA16c461c82b93e0512f96ef34171868f802d2ffbc6
SHA256beab4b049b9ddf2f68cf2700b3144c8cc871a3b2be4f16a3aa06aad35a40ce09
SHA51245fec1918ccc847d08080ff6548184f505beba9f206749be7637ae503145853e56ee9f9c7896002f8d9ff41dff75633500e48dfb4806ccc31bc83530f5770eda
-
Filesize
7KB
MD5e06247b1b7f8a707654105b9e67a0779
SHA1688ed2da1731402470dd89a718e1ce7e6fa034e7
SHA2568963e965418acf159e6ba4bd288745550e6a9878684954e0c3f47b9f0ce05a99
SHA5121bb0db6ad649336d2ef4d7a67b676ebe62c1bcc5dfdc70e241111f2b248ada140fe2bffff997d62b29e44cb103d554395c7e9d080d0b9c32d7b2adebdd967dd4
-
Filesize
6KB
MD5c2a0dfba454891d4b33ed8154bcc4956
SHA15e9e178460a951f8f39b66002eb92234367a66e1
SHA256a5357999973aa5c235f86955d5035911484cec9b75101fa294680f0904e47b63
SHA512803024dce4e9cb410d90cf86ed0bf7d18ff3340aa06415bb94902accdb34a757ed11e2236f7e876cf2d6455edc35f0918e620d331f24f73172ba8007ab68027d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54f36903565e987ef6be35d67210a7f8d
SHA140f5627f33fea9f625427464ec2e2da4ed899380
SHA2563a7b1e3389446f52555e3f9862d848b90c70c6e1904a0a1bddd468861b35a316
SHA512a24f00481cd7cfe598e4d4f86b56de5ffa07963701825d9a59941241a4c5f9871eb381c0128751d669f01c22a7bd6dd136844205ad7af845a6058368739635ac