Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
fa7dbd3161089e0f0a9d0a16cf9ba73b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa7dbd3161089e0f0a9d0a16cf9ba73b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa7dbd3161089e0f0a9d0a16cf9ba73b_JaffaCakes118.html
-
Size
175KB
-
MD5
fa7dbd3161089e0f0a9d0a16cf9ba73b
-
SHA1
4f78286d638bf459207cfa4daa8b50e741c93664
-
SHA256
bf03d40e99070913734c4e08e9fcf88afc72ba77d8e4c6bf0f9a956758ecc495
-
SHA512
2117fc8e271f4213a47a81a5e60cbb35a9a1f75683c871f7b48c4222ae8d2bb5230d4f8da0e871ecb69b77fce2d990ad843e64d89b6a646fba0d5f32226493ec
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3OGNkF9YfBCJiZ1+aeTH+WK/Lf1/hpnVSV:SHCT3O/F4BCJikB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 2228 msedge.exe 2228 msedge.exe 3924 identity_helper.exe 3924 identity_helper.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3180 2228 msedge.exe 82 PID 2228 wrote to memory of 3180 2228 msedge.exe 82 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4084 2228 msedge.exe 83 PID 2228 wrote to memory of 4904 2228 msedge.exe 84 PID 2228 wrote to memory of 4904 2228 msedge.exe 84 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85 PID 2228 wrote to memory of 4204 2228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa7dbd3161089e0f0a9d0a16cf9ba73b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8234d46f8,0x7ff8234d4708,0x7ff8234d47182⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5043378637844848511,9705225718314751043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2480 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD55ca89067af254567feb970e77e8bb66b
SHA1d7dfefc19b51123736251354798f3173191cb39a
SHA256b21652981e6d384a06977a3b20754e4013aee6091680d51e2ef03ad6e7f2f60c
SHA512f6487c541450d18b99120836e179e0cae043839feabba7b92329961850d0ce394cea4e5ad9b5dc72bee2f28a1900d9579c13fdf95ad8e43e11d7fcec4f8eda5b
-
Filesize
2KB
MD538b314c70fe67f2c343b1feeb96172e4
SHA16841d8b41d01f6f584674efada047beb02014cf9
SHA2563d3f6dc29b56ed0f8f7e08ebc78973a92b3cb6ee7f112bf216414acfa4250b4a
SHA51252690533cbce47b1d84ad60580c8b40acfc13a6d5d7a638801940d67dc70c466568bba5362cb0a07a85e1ca52d7dcafb8c88fff527815b6db7180d8a0189afe5
-
Filesize
2KB
MD5e21a121194631ac6f0221b88f9e8236b
SHA117306b3ecac28a62f883b56dc546792992efa37e
SHA25669f6ab205e12fc66b8c05ad08cf397f29ab47c8e174444f4460e2c5f177845d5
SHA512c00ab58d1658b08e682f7c37d5e52c81ad838c178e4a3aef4d186b95bd5ca9742d29bfbd0bcd53155a2e4db103353cace720d28a61bf8d852a1881f8f47786ce
-
Filesize
6KB
MD5c4d1dc4f11820c53c6c32ccc65b8118a
SHA12df34afef3213a14a970eddbe2a618d3ec92284e
SHA2563c7a5dda5afb6f1ac68fd2bce6b7aca2fa23e40d36a171ad5562b7662533203c
SHA51226f196879d134eab0384ff32a3ef79e01f8e50eb1fd1f04759d639e7152641aaff48de210b3142762871aa3394d9f674ee4facb0bab05b8492c302d88490bfba
-
Filesize
5KB
MD5bb9053d3e5933e0f0f7b3be3f8ff95c7
SHA1849b898fe98b5213f8ff755604d883d5d565e009
SHA2568836c06b465c9b7c12e0260a09013215a449c81abe41b4c0ce380a9188b4e4ac
SHA5123f990e34d8b9b6352e7365dd4862b73c2c956877b27198692507ca712f9b3f733130bf2466bd1409876f8e4d95a17ea117aa96f26a6b56e3e42dd0c0f4afbb7a
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55ef87560ab8f454c60dcb5b0322cb5f2
SHA15f8e64c23e1272735bdd81aa0bffd380f7a457a8
SHA25681dc79ffbd023f93134dcf231e50701255b47ea7591d1f48931fbf1fb11b0234
SHA512e693442186d922ad3e6bd9d4818132c80bc12308ca0d9c6e39e98262450e33a1d1955050edbdcacb7eb6d7c421bf293f91f7853c9493e181803b86d96e7e0440