Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
b81fb59b98aebb1e4f28a63226123d89_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b81fb59b98aebb1e4f28a63226123d89_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b81fb59b98aebb1e4f28a63226123d89_JaffaCakes118.html
-
Size
106KB
-
MD5
b81fb59b98aebb1e4f28a63226123d89
-
SHA1
428b7a90f35e0988cc97f5197527bc33eb7e2e8d
-
SHA256
d5fe1226cbc6303bed4c7d603aaeae19e11227dcf1a880e74b2945c571d84bde
-
SHA512
c1c630036a3851aa98da94ae8a398d2da2c13159ba67b1bf7c64bb4b47e0cc481d746ae28fe39de264615fe53a9a32581215d707b34e83cc9c1b63f506a8942f
-
SSDEEP
768:O+JEX3C2OaH9wufDnDD9BVZfkHHjKEupfF7wsG+w+iy4:O+JEnCkLnDD9BVZfkj0f5w4w+it
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 4296 msedge.exe 4296 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 5508 msedge.exe 5508 msedge.exe 5508 msedge.exe 5508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe 4296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4296 wrote to memory of 2820 4296 msedge.exe 86 PID 4296 wrote to memory of 2820 4296 msedge.exe 86 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 4372 4296 msedge.exe 87 PID 4296 wrote to memory of 2476 4296 msedge.exe 88 PID 4296 wrote to memory of 2476 4296 msedge.exe 88 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89 PID 4296 wrote to memory of 224 4296 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b81fb59b98aebb1e4f28a63226123d89_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd101246f8,0x7ffd10124708,0x7ffd101247182⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6696 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6756 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,5766430022134125751,3330836812615272502,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d4c1748e01fe90deea4ebcc1b269e485
SHA10ff3c1054c29a325253873f6f69b8797963e46d6
SHA256bbbd8cade3ec4ddd776a4d0fba955b7a352486c5de5c4fa17a3e67cb8f0ea531
SHA5129f6a34cfc79a98cd4a19570c288f0f603f1b46493f0cdeb81cdef7154b0e7e5f9bec85f04e4a489bf5a690cabaebc83ebbcc6946c0cac41bb9ee75047b892bdc
-
Filesize
1KB
MD546e90844c92ad032692e929bf18efb50
SHA187b5193eda207a3b864a4b6d7206250f06ddd1da
SHA2564efb355083a8cd3a12819e742907db1b7279a1cffbe7de3d3823af3dc8b740f5
SHA512f56daa20eb2bec33657faa50bd9de6039b1be04b31a28dc4dbe434704dcd4f7f16626dabcf3b880be41bdd34f4e21256082e725863877087251af352b6280209
-
Filesize
1KB
MD5ba20ebc67e6c2c628406d1babf0ec052
SHA149df26aee9bdc1eb915d82d7c2ed9f6ca92241ec
SHA2561e3ecee5f42ae2f483f33c6121945ef7b50551ca4c4e8e2cd2fbfe677735f713
SHA5123b4b90bdd1475c81305400fc18dfba9e7c7a6af516997737aad188958b005b1532f0b60c5a7ec4262c0ef30359a0c870d718e1f33d98b37b60a2f96c0a618fc7
-
Filesize
7KB
MD5d299bb1251c1654c63b96e06858f12b6
SHA1db8bc81ad55832f039819b375cc37ab51d05714a
SHA256abf181212ba6a48c4714295fb5d15c900eea9a9a1d96c944ea5684fd9b5373a0
SHA5123a74f57602747a0f00219bf211f4c6032eb59f2bb0a77cafd73211b6fd2363990ef748ceb7f210eec676ab342dabc04afa0b9c46cbc474a5d1f3ab318d394d62
-
Filesize
6KB
MD5cd300ab7d64c10a91eb609a6ad1ac558
SHA1f8a523ac7039592efee7035e258952993f75748c
SHA256bd6043abb3d018b3f215ecac5a7593a9c1a37885431d835331d0676e0ed6e340
SHA51256ddb71ba0299e5fed753c3f6d047e35fe7466e5769361f7fd2389430fdaad20c23d64be679b80cd664538906850dcafe1ccf6e181204631aa036d1173c40322
-
Filesize
5KB
MD53c737c55084219394d2a8c83b4cabc64
SHA1d7d92e713b482d27bb1fd7f31a0dcfa6c3d06081
SHA256544d74d1ba410cb0cde5ffee3c3cf42c69892558b0a6dd05566183314d74b60d
SHA512a5e0f89a02cade30aaae682c00dfa15a15ddd2019e80e4894165f32e3af1e980890bd54d7bbc6b0753a450a73b2128977b32e59ee2bcefe534cf9a68dd564239
-
Filesize
874B
MD585d0aa8f62dd0de9c1d532591b6edfc0
SHA1fb3682f2956874f0cacb4369aa4f015452396778
SHA2566a84115b455ca7a1b9ddfb3cb8a962450bd288934fac18e702bfeda4fadc1c24
SHA512afe590ae04c1f12e55ddf0522c8673e61d6df6ec61e53666a3cbb2c1669abd33212c15368fe1245d97a34098275b714793b0895f547df0a95e375626087b62f3
-
Filesize
706B
MD5426c5a2cc4b387e691b9148acf66c580
SHA11484dfdec597f305865b62bda5bac31048beff8c
SHA256844388e36e748c20ab31c434cbc3271dda9fca6013b97f0e1721a847ce267769
SHA512087730d642bcc9227377007722dac91e15a3b17bd4e9bf1dc20413f4ac0689d6d2c354caa3fcb4a824c496e9224a89dd57ca6f28de10adcc04aa61eb6c9b67ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc082b629e430bfa261cce5570ce5fc9
SHA1dd04cf85882f2fad3899b1c7df56955051556e7c
SHA2567cc9d1b07bb8e566edcadbdecb06b624bb9fa081bc817c90af0e45dc67f59a04
SHA5126ac31b4ca20156466f4da8cb2e79b56319eed47ead250da31fcf9fc473f1261139b91beffca83443c52b481c6efc8958852d5ceb774dc1154941b58bc678b4a3