Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
12a1404f78db504f69134d5ed0332493_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12a1404f78db504f69134d5ed0332493_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
12a1404f78db504f69134d5ed0332493_JaffaCakes118.html
-
Size
116KB
-
MD5
12a1404f78db504f69134d5ed0332493
-
SHA1
e04a6f3e0c6faaf2e1c5441907622ed1360c7d1b
-
SHA256
3922688a8017134c71abbe2a281e7f74dc925306641ee328f5d88cc71302376f
-
SHA512
20dd57b62bee534ecc531700135ba2d64f0601bef6027b6bba63b9178325749162af40c6cb2b10a09636e16437d9147c5d8fb15d9628d135c19699a334664845
-
SSDEEP
1536:sujpVUXRUgvl686waXBbeYl6KbAbAXhi5nHO9/NYyTtebrRTms5jewEw3wR9ulBb:s0OX3YXIYl6KbAbWi5HO9iyY5blBLp0M
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 2540 msedge.exe 2540 msedge.exe 2576 identity_helper.exe 2576 identity_helper.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe 2540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2100 2540 msedge.exe 81 PID 2540 wrote to memory of 2100 2540 msedge.exe 81 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3948 2540 msedge.exe 82 PID 2540 wrote to memory of 3224 2540 msedge.exe 83 PID 2540 wrote to memory of 3224 2540 msedge.exe 83 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84 PID 2540 wrote to memory of 1664 2540 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12a1404f78db504f69134d5ed0332493_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6b6646f8,0x7fff6b664708,0x7fff6b6647182⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2780 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16493064653375611678,14279045613816370118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD55e65d92a521bcab4cd350c6830b2d6d2
SHA1c6c9e50197e83be29943528ea37bb59aa4b80d29
SHA2561c04b9e66a0d94a74b5bd45c2f18d7f9f81b534a4e4384de545ba43d7989d316
SHA5127843ab7eb0729fed4edc2a74e84a9cdf2835abad1aa17b781d25ca6bf4bf8e5ad0018654e7492dccff4f0325e2b9bb3d4c8de25bde8508d7a083fd5dfb069643
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ffb8690a9ba65137bea2288a5a2ffbc3
SHA14be96e68d9ba9a07cf7181e7099024e7c682e940
SHA256bcedb2dddc048b2fcf2fd71932e5b06c87e882c83357454aa6e9c8dddff2eaf7
SHA512ee68984da9b5414431732981f0ba4777159e07b5f1f8378dd33d0e4ebad0e4c0b38e0db24fea066cd77f50a4afa57efbb4d581bb19157ea181f98328b0ae8b4f
-
Filesize
3KB
MD59866a8c7f25eb4f99d6c12b2a9e53475
SHA1c0e35e88cba435513597d046bd34ae029e1cd7aa
SHA256bb310d4069b28dabe2beac9c63866cf27cd91dc9a3a0803ef5cf4973810d0381
SHA51215b8a11879691a0fc0e2eb51558e391e982f4ada5742a0d0fe54b338a9bd433431ebe941c45147c81c63ebbe3f75249ad94d347bee41ef38bd00d133c1f0e9a4
-
Filesize
3KB
MD5bb4fa661707e2ce216f4772b38501ddc
SHA1726bfb0cb8230f865b97b7c7205c064266c0bdd2
SHA256f495c47ab4499d007abda51786d371b848b915611e2cbf7094d612534b2447b0
SHA512c2d11a6594c449ff877ad9bc5467fd5d504db6cf444c26586f526ad956107d6c6952d8d6e729e3170f229dab624fbda3662d5ca6c5f910a074b402817069a778
-
Filesize
7KB
MD53a2f7c208256204971b14be713d32341
SHA1a16f1a9d90c4abd3bd9c8f18be825844a4e85856
SHA256b31ce62c1a4266aa48e572726cb9e5c711250c61e371e1608668b2f0a743a3c3
SHA512a6f06280012652a1217ff87f9750591fdb365f458a9262df9fee65c34048b89ef104e4b2b4e6b7cbc951e22b70e6895eb515204b33bb6e13c3c20024a3858d47
-
Filesize
7KB
MD5bac105e7b95a58670030ffdfe5f3670d
SHA134a9eb193ea929bd925f05b3e87e159e4d8208d6
SHA2562dc2dedd4594c6b8c7de4fe7f2f3ef09effdcc27738167482311e029734c7fba
SHA5128cd2aca13a3e464263615872b8a7afab1b81c75057d0ec8b7bda110e9b3409e97c78add43fc3fad8629c72ca1c95b9285923c5ade0cdb3c28b99a310dfa1343e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cb9dedf9-23bd-4433-a788-b3d84b5087fa.tmp
Filesize5KB
MD5fea1ecd2d87d1b2b5b5541935dc6bef2
SHA14a9832e7d00303e583e987da8ff4f58536afeb5b
SHA256f52450bcb79b95f65def6d2765c9b1ebd077ecee51b48ef67dc2847f2999e56f
SHA51273a7e18ed61e664b3d299a6774b25c04c884b2599fe1b80a128432ea6fd6f71de0086e3460dff7706b15046055c8d3de4f683f35d36cb02f6ff62c871b7fc5d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e4e05acb639dd4f8bf525223af47cb3a
SHA1fcb3558305e896fbfce88f971e29904b6c879a38
SHA256366f802fdbbdedec5bef4c3a670da61a85c61ce892bfa9ce5e8c9e96e20d68a1
SHA5122069cb36115fd2898fffa85ccd533281be547b4c08f395a8f0dab7522ebd5799b8ceb2b82e95ce5b6b64c9daa19127d207d886137d274642ce3df07eb5b4c041