Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
fef289d63b1f63e76ffeda00716f2653_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fef289d63b1f63e76ffeda00716f2653_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fef289d63b1f63e76ffeda00716f2653_JaffaCakes118.html
-
Size
57KB
-
MD5
fef289d63b1f63e76ffeda00716f2653
-
SHA1
3809958978a58dd1403512882c6eec8a7874cdaf
-
SHA256
95eef33670eb22fcc399617327b57ef61cbda6488921e09808becd14cb410947
-
SHA512
63d4ab8083d311ec494befa0844d0325c6c1992c0871f5bc1c63a149654ae023f25e2607e4b4408bf13812f2799549663c0a7375f3ecbd0483e1798b1c7e5098
-
SSDEEP
1536:OMah9sKjIh8XU1B+h4aMkPY2kA3HiOkzmrbD/0X312vKMOC93GuU:zah9sKq7+mZB2xH3Smz0X312vKMOC93Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 2356 msedge.exe 2356 msedge.exe 2488 identity_helper.exe 2488 identity_helper.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe 3936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2092 2356 msedge.exe 82 PID 2356 wrote to memory of 2092 2356 msedge.exe 82 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 1716 2356 msedge.exe 83 PID 2356 wrote to memory of 3508 2356 msedge.exe 84 PID 2356 wrote to memory of 3508 2356 msedge.exe 84 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85 PID 2356 wrote to memory of 1772 2356 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fef289d63b1f63e76ffeda00716f2653_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff8234d46f8,0x7ff8234d4708,0x7ff8234d47182⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2316 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,18185646977786259727,15618283134462330059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5d36fb0d2ab815e2aab9b724718781854
SHA1e8d0fda4e9a5c06d59db770b7f57d38e280bcaf0
SHA25632030c64267e0f7a535373cdbf5fb6113df420f0edf3c598ff40cf1bb56dada6
SHA51243b44a4cb521300b6852e2e46eaf46f5ba35211a02cd7930a3d81ac8a2f8b423bb07823fa8e03c11305cb8777a99730a223763bcf5270fb119a597486ee97776
-
Filesize
2KB
MD54092b710800390b49a3152f47bb2bc73
SHA1e96c1beb26b6e29155131589b69e650b66258877
SHA2566de3055eaa7aa87e7b4999acb720bff67d897a353e3ef32185b2eab11fcd0ae8
SHA5123e0de467348f8a5a7cf2fbf69ff782866ae52a1f7a07d0930a5b750fd8d302b2def86c6f4de5748df8edb4e5bce185a50987963babcfd3ecbdd194626efca841
-
Filesize
2KB
MD53b6be7fc3363d08ed2b2f3ab110f3940
SHA1cc5dda60d02510e271bc24f772d2fbbbb4117ff7
SHA256243b405f5f437ffb5f93bf252814269839ef344aeca258c2e52927113457fe5f
SHA512be55bcf35eacfafdd008c1a88827f11e5ecf78706437d5e7715dbd878a631b281b66fc963b8af07e79d6ff6c89e2ae99d6b0c73d9544d943df7c59fd8dcbaa2e
-
Filesize
5KB
MD571757cafa83892f205a32961937ce276
SHA1abf3397157058048feabdaa02e3af05dc9101af9
SHA2568b37fc07d106e0455604de3667a6372546c309741efeffe23671fa12d5ba8c3a
SHA512b99f506c275fef26a865d1c5a2e04c55a8c2554e012c17890fbc342af438b622474113fd4c8f1ab1288ddf0aaa618871a30b185d86d6daf1706c642affa829dd
-
Filesize
5KB
MD567f6d352e1548eff91b1495ef5aa80ef
SHA1855cda1293f4509b2bacfe8510ccd306be4a49ec
SHA25673d9bdfea9ebebdfb2af246fc3239975060f8e731efae60e2b4a5436900ea8da
SHA5125a91716001d34bfa1edb573fbc8f52e1172a984e6421db596c6829e1358de257a5920e4f7f95b90d3ef3c5accab17f20d4646a9a9d5427ad06a554226fc9a834
-
Filesize
6KB
MD53c06c3acf0e5790c5c6c7cc5593aaac7
SHA1b87049d649e079810499d4d47490204f6eae8ed5
SHA256625f2efe93dee4e6632320df994614aa6a514c6c0c14b6dc2607d56765f48b81
SHA5124edd5f1baca094e8a2eccf80ef2dcc978c836b80f8987ce3daa161706a2e5217bb32154ed6b158e790f4845dbed2560d33545d836419268c82b4fe06598a707b
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
707B
MD5e2222eab2870a7a6d171cb104956c4e2
SHA1ba0aac3d47c1fa3fb60c01d7f753c44cb3e44e92
SHA256db20cc3c4be6e4ac8caa169199a5ca4d538f661eac590953851f5d9878399524
SHA512a5d2e605a5a1863d2279500629aaf9fc409afdcae65fbfe506f9eb23fbc82bd1da1faafdab70abf37901d81168c444a174f9b89b5883c1df7785065d32943a83
-
Filesize
203B
MD569cc1c28d60503b453b3d9497fd2c2b8
SHA1699f6ca1ac9031975054cc432815150bcfb6b03f
SHA2564b14780d53ede92b694230a271c88ccfa59a6b6fea10fd5cc12bb2f834174595
SHA512b58e4970adcdbbb17c71748aca23c0e88a9d9f9bb57ef97b9b7f2829778c169b9fd797d896ef5c9e32ce5b14d918a4f68e9b82bb74acf1b00b4922715fafc9a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a68f87562199d5173591758868b53fc6
SHA1573fd8653c8b0c87d93b8aaed412f4ac4e965630
SHA256598b67df6633de95e61936cf353ea8eb9b3ae6cf598dda84d0722f2b09868eef
SHA512d12adb8527c24eb4c6c4488fd066fa0a770b74e8251a7d9696bfa9fffdca1a2261eefda3e45c96a27d704a6fe4f9f27315886ef6ac84884515c05ebaa1a2b128