Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
b872bee6552ceac1c01c6584366d1fb6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b872bee6552ceac1c01c6584366d1fb6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b872bee6552ceac1c01c6584366d1fb6_JaffaCakes118.html
-
Size
3KB
-
MD5
b872bee6552ceac1c01c6584366d1fb6
-
SHA1
bd92ea45e6bc8466fa6fc12609f290cd861d0ebd
-
SHA256
a4da1574388d8990ae724bf103190417ebac7cc7ad686024ce22f3e57b70d180
-
SHA512
ff5bc3af82ea866cef5d13752fccf880d5212095b98f3cef825c18e4db844552bb4912f54c707291bf21d3ec493ad41d4200e53c09cd55e16432be58d1c4b11a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 1740 msedge.exe 1740 msedge.exe 3024 identity_helper.exe 3024 identity_helper.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4340 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4340 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe 1740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 680 1740 msedge.exe 83 PID 1740 wrote to memory of 680 1740 msedge.exe 83 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3600 1740 msedge.exe 84 PID 1740 wrote to memory of 3452 1740 msedge.exe 85 PID 1740 wrote to memory of 3452 1740 msedge.exe 85 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86 PID 1740 wrote to memory of 1436 1740 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b872bee6552ceac1c01c6584366d1fb6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe024c46f8,0x7ffe024c4708,0x7ffe024c47182⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14128403668548433283,3379017459908801953,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5d8edbb7f54c95e67208401012b8dcbed
SHA157894676cba6b0a58445429e6f56366d0cc14d2e
SHA256331bd239a8bda1983c2a3b0eb482e639ba6d08b64e8e2fd6ebc6a75e14246320
SHA51297875954a1f89aea2fed4936b6289d3c465e681934c6efad78d4745f654e9bcf61c6315c353750e445c61978b6055af569e3e3066903eb31f2eeccdb4df21ff8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
6KB
MD52f1042d20e20a1f0d149977f6471e5db
SHA1895fae77f7012ced10a63841a32d866e0c023e43
SHA25652b05bc6978ef03dd13506464ace4364f02006492f0e3c55147646e99f7e9678
SHA5123deebfd9edf1956cc38c694f2af73cab409b2a9b154c373231f6725af7efc762d535bb09417e7814701b1b638a72960fbe31c2d048f5f0fa77f8616a5977501e
-
Filesize
5KB
MD53e92af057bb0f1f05e350527ebb2a507
SHA1b63c84cd2ad6d473fd34cebebb10c1e49573b279
SHA256e65173c0fa4b653fc0b45c10b12ac01cb10f04cf823eed901a25dbf87597c2a2
SHA512642ac881837554aeabf2ef3bd2b004f9873c4bfc57b03bb49571da9313c5754ca6d006692501a0c7e8b5c2c0e0cca0d51fee42140f8ba2bf0faa45fa87ac84a8
-
Filesize
6KB
MD57b0b9d5edf939e8a831d9db2e06c8963
SHA18e7797e4662c68025b5b6033ad02f08247f9b9b3
SHA256dc402f0488943e32f59323b58a7c1f8cf19ec456c81923d36846f532fb2b6855
SHA51224f0f43b0b4ccacd4b4630bcf52da9a7d32c1f169c035cc045f94f807d2fdf099e4ff4e20b1b92063e9b330c5bc2d8fe4b04c61902cc5f0f6e4748398dda0171
-
Filesize
6KB
MD578ef4987f8ab2ab8d73a73a0f2181d81
SHA182217b68303461ec66d42c8d7e5a2d1e46f6e2e0
SHA2566f10bb5e3502da6d2f8e614680f6a24e65daa497b72291beb0797cce0e3689f9
SHA5121070d8d162899c86cfc5d419b60ea378d36c4ec93611dbd3bcef7c8466c9da81fcdfbd3a4437e9c832d2287c8d698291a2bcd77fcb5750cc32d5938f5b3764a9
-
Filesize
372B
MD5ab48138bf9ffce83024b9bf77e503a7f
SHA173294aef90546620b27eabf51b0dd2bd040cc984
SHA256eee9c8dd1310236fd7e3002c07d0f27e12d4efc4a7a4ea84cea336bd782b04e3
SHA5121eede8a17f028005bbee8c1143f5178614dc70fd0409d1b8c431b3fdabc432994b6d8481d2d4479d1236d013b6b9f6daf68e81cad6587bb60ccd523c84cc5fd3
-
Filesize
372B
MD59239e4d90872c6d7f540c1273b9fd312
SHA12298adbdaf40d0c2fc22963e239aa9ad5e17b7a0
SHA2562cde93df0de31ffde6ce5e1c9084fa554bf5811c985a0644e57e36b019231f76
SHA512ec05826b57c14576230aa5276728c81fed35d3403563a4dc429dcd47a62a446f31e2164cae679a91fbf62699b65ea71bd27d4812ea8cda9dc423e4153686e231
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e0ef90acfac81ef0a46bad9e6828f067
SHA1e6010e0c868422800913f6c13de9cb91721cc349
SHA256dd63052f8500ec089ea4c5b76a2faded923da4ec7292135b1fb1fa51d615e311
SHA5120c2a5cec994709c841e57dc0a9b23226662a867d9d519761789c73c522ab05359846acebcc1c5f358b87c610415e3dbb99a28e21e8236bf5c7b05d5ec37bbe1f