Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
409330aa75bc6276b0f06f65e54fa5cb_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
409330aa75bc6276b0f06f65e54fa5cb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
409330aa75bc6276b0f06f65e54fa5cb_JaffaCakes118.html
-
Size
27KB
-
MD5
409330aa75bc6276b0f06f65e54fa5cb
-
SHA1
f5ef65683f7d61c31873e877d1bbf5c760aee60c
-
SHA256
9b08da492459efb0ae9b81af1333897ffbbf9be84fd7bdb5c4a32f1a346cb7b2
-
SHA512
aed716c02a809626479c88fd55bdbaaae364fbb49fd344d234a7693d11328fcef7ef33cf54e5f4482b293d9bc2326a95249e56a3fe37b86efc07cbd5a90caf30
-
SSDEEP
384:U41BLKGR1m23lzaK3cynWl9x42kcSug27ZPN+/6:U0BLKU1m235aK3cEqx42XSuR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 640 msedge.exe 640 msedge.exe 4252 identity_helper.exe 4252 identity_helper.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 640 wrote to memory of 3332 640 msedge.exe 83 PID 640 wrote to memory of 3332 640 msedge.exe 83 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 4820 640 msedge.exe 84 PID 640 wrote to memory of 2008 640 msedge.exe 85 PID 640 wrote to memory of 2008 640 msedge.exe 85 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86 PID 640 wrote to memory of 1224 640 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\409330aa75bc6276b0f06f65e54fa5cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff27a446f8,0x7fff27a44708,0x7fff27a447182⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7016 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1720 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16068948550694960118,18200561609400133191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59d7e62c87d0fbb521b5df9eef32b21f2
SHA14e29b131a0223bb9a42bbd50dc166ddcec702247
SHA25644e433940b58edd4f57129e5dcdeb1e09a66e28dc9a4fd139a736989af4228cd
SHA5123bbeed595ee5bc4f59e28438b273a684b7f2c0adf8f4a74f1d9fb7723afd4b19208405712b9a4688fc34708a6de0c5bd0c0ced450698f4a6fc8fb83b065961d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e2c0327bbdbd43a7f97ba7c4be05eb9e
SHA13b5beabe7fb9a7b18ace7778f377e90fcbc12ac9
SHA256d4ae3c901b4170dff5f410b3309cda85647b406354282b2b708fefe22acfa769
SHA512e27d178fd2f038e3cfd142753d84dd2afc03f0e5253253c043eb171c47e4768f2568a02e02c8e3988e1b64e807a32a56027f7be466c0a44ec05ce1642c65c45a
-
Filesize
2KB
MD5f478203094f439fcc1d71b129c3a3449
SHA176b84bc1fd2c3a57156f056a184edc0c74939604
SHA2566338635a79c9bb029f7726256aa817dfa40185309ae5057c20625333418abd39
SHA512955c403bd368c9d690d418faaefdf08f3bc10205745f24d1d0dadc5c2c48bd59df3781519b4ccbd4d4d16ea8c9713e6e07763b42bc24f3999a677678c5a1baf9
-
Filesize
2KB
MD56cfce8005cb561d546e9f469b5aa60be
SHA10de61d8d0677e6164ed8a20241f50f2a9c00ad09
SHA256123bffef52ddd9d63340c909108ccdf1b7a12c7098a6c62d2a8e63b4cf28515a
SHA512af86475380bce31cdf59fe9a42d42e704c9c8c492fd461b0a4f60bd1b265fd14fcb04b9159e938e2d2aedb54e24e04bf5c682dcf60ab63ebe400f46d82fbab74
-
Filesize
6KB
MD586963bf8204fdafdafe78b78ae75e7cd
SHA12080a6dcd4a2afcfcc274ad4fc9cfbadc81eabb0
SHA25615ae717f29658db7b7902ea87aa8ac479c95640a78797c30806c9bfc53d60a54
SHA512ecf389e5350fa9b779c06acfd33f78e81e7a351c187066932283ca8a882d27892e0f47876ea81b6e156e52a6aee815b19aa6b875e511167f202378bcf6d26af8
-
Filesize
7KB
MD55c56f6c775c9bc5d7f5d6dd308e6953c
SHA1b5ff164d7e58cda2db0e907aa86ee8c317482e2a
SHA256b17d91ae2a60adfe4eeb17ecf51bb59e334dedb4cb93ec4cf558c35637e7d4f4
SHA5125f1a0b7e8d0365073eccda2077a7d8a6a72e2f1e88bb7bed35af5f107d8f90f5aa3f17b700e6367e524d7a048cb2bb1f2c5619d2e47da1ded986e336691d180f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e64af58cff7098aff8c0e1c740b58df2
SHA1253b0944080ecb0950165244dddc80e430bbe9f0
SHA2566675b2704e9574e22e290dd9c939bca99e998f573c9113f32ec63535e6d9e650
SHA512b841926321ef310f2329f4b2a1cbb1c517c105b5a91bd78ad51f67e5206cff1d18301955bafc4349c096d6913cf0d44bd0548b330405356d8c3eeac503533cf1