Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
94720b09f0a45f20d694fc69a439691e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
94720b09f0a45f20d694fc69a439691e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
94720b09f0a45f20d694fc69a439691e_JaffaCakes118.html
-
Size
169KB
-
MD5
94720b09f0a45f20d694fc69a439691e
-
SHA1
c4645a19c0f6b2123bb932688421f35068b1051e
-
SHA256
7c3b3355305e304e886216e297138a31928061acf1922ee1ae11ead18e89e5c9
-
SHA512
5617cfc87525c24dc179ad294e9e7a3df7015cb7f35d55bd314e7f107203c049e7a57ed63c4226336d14dd4ff23b993e9691e6697fa0f9438b03f66d3a624d59
-
SSDEEP
1536:+ddqsGmT3W+pG28YI6zvofxCLPvHfrS2pBsFKJ4ZYa8SblLkO2m4LSynHN0UX/Oy:a8JYK4WFLBsSynHNUW7T5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 508 msedge.exe 508 msedge.exe 4640 msedge.exe 4640 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4640 wrote to memory of 748 4640 msedge.exe 84 PID 4640 wrote to memory of 748 4640 msedge.exe 84 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 4032 4640 msedge.exe 85 PID 4640 wrote to memory of 508 4640 msedge.exe 86 PID 4640 wrote to memory of 508 4640 msedge.exe 86 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87 PID 4640 wrote to memory of 4408 4640 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\94720b09f0a45f20d694fc69a439691e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc65f46f8,0x7ffdc65f4708,0x7ffdc65f47182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,18172965356362280335,445014040191197036,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD55adebca263d48028f2925ad261c50e0f
SHA1187a776b3891d10503e2302024af00669402f73d
SHA2567a8776d05bc5ca8c3a4928d9b7b1a14a493054d48f75b1e2a8c51e8840809b37
SHA512af8a72abd7902e27676e190faf337e9470e642cbf60168d3f8a5405e8d344304102bfe5235e34cb6ce8e44d19994df039ae5d98dc434a0888c1ada7992dc061f
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c566b1c0d317bca5b533977b4956f91e
SHA17c1b93cbfe6906d018a59e1a14291c3042758d9e
SHA25699f57901a87de015bfce503419d991de141c663e2c8d0f0230458e9d483143ce
SHA5124926f9e8719d62ccc3c47d789a16ef286d4dd46b1dae984a1fa27b1adc4ec3a5047288c63151fd6aaafa89e6a524bdc22652903ec88f12d4b8084eb5eea9a082
-
Filesize
2KB
MD5d75670378a1cb0223ca2493824444a07
SHA1c8965336a6d0d3e0e287842df9f091c713df8b72
SHA25636c4451148e8384989777db8d27d8fde053440a99c9397c341028e2357ebbde8
SHA512f050d40ea396696d05795621f3c23ad9f6acda6bc33e6a5b07a3bcb026c9dc75f814bf2c9585ad8b0dabdbc493894bd859adffe2a75c61ecdc7ea594c82c76ac
-
Filesize
6KB
MD56580ed7fee5aa8e5af4cd1c1f04e368a
SHA174c53fb669863e8a7e4efc88ed997b0674b17618
SHA256c0d3ee773579fe574ce1723079b0207076469d705ef129cc7c92208226c7e4fd
SHA512f5a57c77cea3463fc2651b2d1801c7f2be75146f8f5b9fc5af9c92df1f475a11263df9608a26d7e6c96f0ad4734242bf9efe092f464269f746d3208e1793d52d
-
Filesize
5KB
MD59dcdaeac67b2f842a0570904742ea679
SHA14f0a057654ca842a3b8c3dacc3776670aa64f9e1
SHA2566e8c3abfa0a264f6a1759f2a88483113a4ed1e60498fd9964af187dae10882b2
SHA512580c822e28c62e029489f9a4d4760625288b70b54a6332b7ced31939057d9e7ed752243e2d1546adc5ac30aee69b1644e1083235ec2f1ce5177a04cfe615fee8
-
Filesize
6KB
MD583aae07f10496778d0b959d417b5d4b5
SHA13f2d2de05bb5328955353c9b13addb7715abbbc0
SHA25676cf5c6bd085b3bcb3665f4323988ea419a51b653655848b6ce38c7e25f527e0
SHA512326ba4aa6c5a5c3cd74c69ba54974eb60f14644a9f3e0503f8e13ee29b52dab4c1880ff66a19f914d724d5587afa6dc3e6df4c25d4132bc727e253897b3d0eed
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145