Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
ce04ceb134bfb713233a2c139a411772_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce04ceb134bfb713233a2c139a411772_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce04ceb134bfb713233a2c139a411772_JaffaCakes118.html
-
Size
111KB
-
MD5
ce04ceb134bfb713233a2c139a411772
-
SHA1
e4f6395481967295eb0865d4c3bf164faeb0d78a
-
SHA256
aa7eb4ce3c9864188b372a3cce1a9cfc5ecd852c5a687616df6f5ecdea35ff63
-
SHA512
4856aa2250fb1e4f4a43ff332ae68687ec652c33b0600aed8a30819c0a3be419db9ad76e7848d8a4d98b6452409c7f3e5449c42d571f8c87805fd8ecb0c0cec4
-
SSDEEP
1536:9IimAKWbg389eC6Nc+ap5eOqYmKtYkIROXi0wu+nAX/l7M8sAfLkYucwiGghNic:fbBGQeOAUssXzD+AXdouucwCN5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4912 msedge.exe 4912 msedge.exe 1532 msedge.exe 1532 msedge.exe 2844 identity_helper.exe 2844 identity_helper.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2412 1532 msedge.exe 83 PID 1532 wrote to memory of 2412 1532 msedge.exe 83 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 1144 1532 msedge.exe 84 PID 1532 wrote to memory of 4912 1532 msedge.exe 85 PID 1532 wrote to memory of 4912 1532 msedge.exe 85 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86 PID 1532 wrote to memory of 1868 1532 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ce04ceb134bfb713233a2c139a411772_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffee3946f8,0x7fffee394708,0x7fffee3947182⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,7396065096920398655,3387836998460982796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD553d10bfa54952b8714cf133ff8877bb1
SHA1adba100bb981d4e80c6795e542807b717a9f497b
SHA256517cc5b302837ca06611ed36557353bdb3b87db77225d66eeb362f17203f65b8
SHA5127baf02a820f1b3383a33a0f1193e746ba9412412753029c4b556edc0f49e40b36fa372a00f6d055760bade175818518ee8d8ee87034ab16c326e454897fe5e3d
-
Filesize
2KB
MD558e9b49a308909103549034d8d623372
SHA1fada8df72fdb371e35f8d6289851978046246dc2
SHA256aa5111ea63d826d7ad2622b3c70d0e93f8c9b77a911704f19fc9fb187c027a74
SHA512c0cb551f98563495e7772e94398bc2349eefc5c5d0604fdc76f5c376dd08cad02e25456af2eec747b12c7bce6af654ec8f1081fe8e1fb2bc5e46fb4bac45e4c2
-
Filesize
5KB
MD5fa01b35748cdaa52ef3c8607911fe096
SHA1b968520aafe3599d92ae250650836c4544adc508
SHA256f50d0e11280441e907aaea192ed7fb30c8f82ed1bd35c0eeb9d1a1f5b45591cf
SHA512e8ef9ea405de92fb3fd898034261f769fe3ebc8386958334b28511a552b9b8442cd84e28bca7dfc5180c13624f2e0bec18fa28edae8f8019e1bae10025dfb356
-
Filesize
7KB
MD53d339bc17f520349486a2c0d5658de0b
SHA1971bb84b39f4007fd69bf1f9e0ba84166e0c7e97
SHA256418cd9b000dd240f2bf852e60c571934efb72c536c817bee2052a48b3bea31fc
SHA512b425884af8d6ac243208fff8ca98e18fb65c084fcb69ca66859576b3d5db3558c15753089f5e1f06e72177508a6f58c46b64508d30e87274bfb4c808b30c6667
-
Filesize
7KB
MD555314a45011b6d53d035764245eb4d9b
SHA14fc97512d3874fcf6fa734d6a7ece2e45b76f271
SHA2562075d9499be5e5007d3f77d9511138d197a9ef8e089a47cee9fd1cd16abbd0ff
SHA512f80e4a6cbc1c4f382b1dc6c3f307913cbc73e80303abe15c0fcf2ff465df7a358f9834cfd434511a680d54f833a44cb124d3f0d9475b32142f3d5265563b03ce
-
Filesize
7KB
MD585ddcaf8907f3d9f55046aa8a33adeb0
SHA13368ba50f89bfa772f55987ce87992116530fe0d
SHA256a8eb840c26bc675b14b9e34d8302b14ef054db183fcfb9b47e9eadbb21aab2d7
SHA512cc034de46acb14c572a6479bd04d9baeafe1efb7139c23a8f53eb8fee2b66197f728064a98020107e91fb665b1839e80c1b65dc9f0e3575e1f6aefb279a37871
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD520f761900eebc09fe8e837a893e745db
SHA1bb1a091dca901862d3bbce10ac8f2fe7ecdb4f11
SHA256f30ee4268f50171f4b109bf3cffb5b89033e91f0fa8be22108d6fc2dfbedc729
SHA5120f10377fd72e1c91788bb2d558f256233f1d74dfb0ad9d7b72a6daf2213b221e5aeedab8575100c5b285c9c2c8e08af83f272044a43b4f7293fcac23981c4828