Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
3d9f8cf0d5f552287fdb94b51c6c6a77_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d9f8cf0d5f552287fdb94b51c6c6a77_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d9f8cf0d5f552287fdb94b51c6c6a77_JaffaCakes118.html
-
Size
11KB
-
MD5
3d9f8cf0d5f552287fdb94b51c6c6a77
-
SHA1
fdc9d0076b99ecaa02f8aaad611f4642ef37b0fc
-
SHA256
78fee3dd52495b99128f65b633ad74936ffc77bbae598e7a73fd544fbb2e1da6
-
SHA512
a3c270b5bc4198c031d281c10f5504aeaf4cbb80d1ad05abe33d53ca697184b3b490168e850e9c9d0cad331eb74fe22552652f6d2dcbd33b5328b9f5a89d7c57
-
SSDEEP
192:UhVqp+p6pVNoS9SHbV3So0lxQJMJfJiJJ15JnfHfU+BSTR/M7B543iGb4w9WVadL:Yu6IKio0lAtsdg44OL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 2088 msedge.exe 2088 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3872 2088 msedge.exe 85 PID 2088 wrote to memory of 3872 2088 msedge.exe 85 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 3352 2088 msedge.exe 86 PID 2088 wrote to memory of 1632 2088 msedge.exe 87 PID 2088 wrote to memory of 1632 2088 msedge.exe 87 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88 PID 2088 wrote to memory of 1788 2088 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d9f8cf0d5f552287fdb94b51c6c6a77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf3a446f8,0x7ffaf3a44708,0x7ffaf3a447182⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14751870003758808690,545725158695741017,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD511bbbe79865595979ed0940025ee24d0
SHA1eac21a02de89f6d19d38897166339dc7b1fb20be
SHA256d2ace488185e82cd8de9067d1db6efd4cf6bae4637addb8678045dd4e7245d1f
SHA51262e6f99e610a78fa410b5e7ab75e5e7a543537b58c3a6a6e151646178b3e82faf3c3a241d5eacd33ba708ea1a61b206d1a3e77ab16b935c24376a50a58c1bc9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD54a4bb6c3ac3d33fb65d0523fcc597724
SHA14332d82d4e3cc9ed93011ef8ef2d3de0e3e5043c
SHA25636e26123acc21a23ce39bc8c11d413ac583e18deee881a4cca034387c5355e25
SHA512266536dd86abba548bbe2c10acaee21916638e91bead01ed11fa0b47580204eee76bdac7bb30ab57c962018d5b035a1d5a758f83b88731f78d89053b94f1130b
-
Filesize
644B
MD502e2a58b2a48a84e5a875967a6a7e4b4
SHA176c0b035d6c27ace138bf91b14e87124e57ee18d
SHA256509095a15be0f591eb9b735887c273e7c3d89cc2bcc4facca74aac9488f07fbb
SHA51289bd8282ee644adaa1271f187691230080f914daf1f375b608832f05f6b95b68cf812c89196ff927b29633466caaca3812a12b01d14326452d9fdd361d4f1076
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
644B
MD51db14ad81e6a858f64c99337882f706d
SHA1f30df1ae6f09a2486dd879d8d00c289a6f42bd06
SHA25604314d9b671c42a6ec12869a562d6a0856969c83e7169a1a5aa9922bb80b7cc5
SHA51284d933e60a93072f3721a1274c5ef8d3ad56271d14e829b123b4d64346f6fee4220de120cc5f62f6efb1630fd86a5cf669bc5fde9a2d44c609ac2b80a6078aee
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5819c20c751d5f1f6ca34c2d885d9b733
SHA1ae50738f9983b4f70aa5cbf2943409f5f84a2eea
SHA256ceb412a99b955ff281590348dd851d9fba2ab78bb912a38598add53d79be8be6
SHA51291fdc79105b3eeec04d56e1e598b75dd232e6f4c4950eb57036da47b5374b14802965caa2ccb6dc1f95e857826599ef940778899d6034ac5e0dfcc651277e8d4
-
Filesize
6KB
MD5cada2ca521bce13a5a0026f67c595f2b
SHA1a10c97596788466d934dc29d2e20df49b651cc0a
SHA2567878be8c52a7a59be666610920f8e0304935a2f27d00261e08b4bc7479da70e1
SHA512664e2e03c5bcff1475de142ac65ac97f39ad56cab4746987013d90ae3217f14ae2b121b811697412532818598915fe5f512831bf58665ef730530f6a5ee79d07
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51b327a7730ea6dea1d1408a54eae78d0
SHA1f22cc175bc34a279e6eeb826ee21de016fa69459
SHA256323b50618625556ed25d772fcc7998d58b6dabb5cbeb813813e435a02e3ef792
SHA5124a5e90b8e8566fedd4da35c31ac57873b256825294cf3c21adcb4fb1c5728e7f490cc8c854997485252747ab8c238636e475ab22fc6751e5b564843ee3254505