Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
eefe07c546cb3b0445e7e1c160513cd5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eefe07c546cb3b0445e7e1c160513cd5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eefe07c546cb3b0445e7e1c160513cd5_JaffaCakes118.html
-
Size
149KB
-
MD5
eefe07c546cb3b0445e7e1c160513cd5
-
SHA1
f3027cbe33edb863d4b628c70fe4f7e1a721b913
-
SHA256
2b2044cabf462da1e89bf08ea010bb91be6c995329f2419dda459b9e4eff907e
-
SHA512
84a4ff15c720879e45c8d6d758b625fa37b89313dfc864fdf1110bbeb097f6127a713f41757b66dc407d10d4bfc32427ebe63d9543b326ffff466516a6717089
-
SSDEEP
3072:XDRcVhIVs2LQegU0Dzvj40MZEPjLpUxAfYxslxNcl8CL/U55DrHSpG+34FW5PZ+n:lcjJ/lSntvRxR8v
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 3056 msedge.exe 3056 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 1100 3056 msedge.exe 82 PID 3056 wrote to memory of 1100 3056 msedge.exe 82 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 3888 3056 msedge.exe 83 PID 3056 wrote to memory of 1872 3056 msedge.exe 84 PID 3056 wrote to memory of 1872 3056 msedge.exe 84 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85 PID 3056 wrote to memory of 1136 3056 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eefe07c546cb3b0445e7e1c160513cd5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf28c46f8,0x7ffaf28c4708,0x7ffaf28c47182⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1968 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2520 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2524 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4710268359180449811,821683994341315384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\736826d2-1cf9-4f93-bc5e-5717286d6352.tmp
Filesize704B
MD53b0ec283766793ed6f8a85841df4961f
SHA102aa969a897a91cde48c8336f4cc85a329b55e84
SHA256685f424c1bb6631a1a53db8fa642f594c306bd8bd36c1e6e732b9bfd6aed5d73
SHA5122d23fd369775f6c5587b81c96cfd7c9a14e579ae8ff799fb3f805439dd3e87be285f59a281cdd2e32076dc288e8aa9acd9329f25f7cbff615cfabb592603e5b2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD54f89cad151fa4d1c5f4b38e79fa2b2e7
SHA1bc871390df909e458afc8f5c74c7ffb9ff320758
SHA256e2060afda633891ce4b883eb2e239c10164dc5eb9ed50a3185f87ec2daa628c4
SHA512b8cbf693975099d2d7a2b96769daaa14afb52effb6729d528c57c2726fad0e0e2d833c81c59d95733eec2c889aabdda1e1f1eff368064a2c76f05fe21e29e096
-
Filesize
1KB
MD57fae56ad92cb0b2ca44ce16ede97cc58
SHA1624b2757a52ba1c55a7096e0f4743c7d629448d3
SHA256e10e9a992a49e69343860844337fb4b956a6b5f2267a4d236765a8977980f350
SHA512d9935d5238487d91c4d52f73d09e44e40c10966446e05e255c3011a5cb1724006593acfb0eeae159e722616a1304d3e536b439bd10e5b20636563a31513ccade
-
Filesize
1KB
MD5baeb988dab7faa1cca5bce26067f5606
SHA199e276aca6e5be4763437605b553cf0b82907e03
SHA2566ed15ecde5cf0bf02b28553cf0073c8a5ee87ade7460ac9882a5966d6e55608e
SHA5127e6816923bdce5e06f82d55f224d6f3f814d97dffd76af1ee1c2af0d11942b9075b58708a574689a9e3534728a59585357497b3772099178466c65c708843980
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5a494b0bdf74a3ae7867eb74f4cf6589d
SHA11db61bfe42d20fc8b50d4a650ceda4b20f6d35bd
SHA2568a091f2cd7f045d394d224fad9e3214a309193b965e16e8c7713ecff2bc92da8
SHA5122d269d9f82b2fe6f18041e06f99ce12dc1369d54f3dd2572fa25c209a6b13606bf9725a8aede2aa165a1ad379221ee3ffd22e483766bf02a1b8cc5e7142923ad
-
Filesize
5KB
MD52c004e0914b54d831b4e3651aebc7fa0
SHA16def7824a65982dfcb33f257b949c18e8e72821b
SHA2564857f38f6612bbbf1be6808a5b95a9d9bdd9153d1e07e4173f6b74eccec57a13
SHA51212278864d432545f8b73ae992418750287566dd94a8390f2cf17d02a6a9eb8e9f2c9e09aae8e83ef321371c76c2a18c42cfc6c95c57b9f6217d83e8170ac76f6
-
Filesize
370B
MD5060d308c05fa7556843a5ca75d10701f
SHA1fd86b217526884a9fb30d504ede8914693184d43
SHA2564d8689da708e5fa94c176f6cec38d002059fefb4b826ed045a6e57f86601a462
SHA512b3fde3ffd57b1e5ba5f81b52bfdb07e2a218164cb2907127ba5848ce5824dabaa89b9a5d5966b44b72516ddd9080d127be11abaf9b43b8deceb4c7983f54e74d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5668fd2f27d9de21eb37131769bad4f38
SHA1223e5cab93ec46f7b013ced562f7d76755169c6f
SHA25657d2d05e1f498aa652fff743e074e5666488d4c2a2a84dd106c87181b84a67e3
SHA512bf0e6cf5c1ccbf34be8209875c735344c57c7e657fa07fbbd34595d4566a65ae29d3c431af0da3837193fb03e9d1d6d411922a39f4c04091ae8bc2dad6f10175