Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
5711b973a6f326506b52f8ba2071e722_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5711b973a6f326506b52f8ba2071e722_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5711b973a6f326506b52f8ba2071e722_JaffaCakes118.html
-
Size
42KB
-
MD5
5711b973a6f326506b52f8ba2071e722
-
SHA1
af18b6c5a8d815f089addb646368258a359183dc
-
SHA256
4c079b53a39edee35219a0fa93e5629c347c39776bb2e7682fd141ee643c8f6e
-
SHA512
7c2a19228337258eda0350d5a789922533324e043b713eb6bf682f7c423d148522a43e5dd2d59ad65e44295cc29ee1f26b72e23a85724ee3e33f3d6b51a92dad
-
SSDEEP
768:Bc2m21LxrFw/Qy5BH6JhOu1okJC2CjHk4z06QG3apFvk/:Bc2muLxpc5BsYuJow4z09GqpFvA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 4540 msedge.exe 4540 msedge.exe 4396 identity_helper.exe 4396 identity_helper.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe 1200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1492 4540 msedge.exe 84 PID 4540 wrote to memory of 1492 4540 msedge.exe 84 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 4820 4540 msedge.exe 85 PID 4540 wrote to memory of 1612 4540 msedge.exe 86 PID 4540 wrote to memory of 1612 4540 msedge.exe 86 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87 PID 4540 wrote to memory of 1548 4540 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5711b973a6f326506b52f8ba2071e722_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ea8346f8,0x7ff8ea834708,0x7ff8ea8347182⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11398054418514214699,2328747775628534223,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5d4b2fbe6dc3c710f20b896d6ddcc8e0e
SHA1f1e07dc84920c55a90e1d7be5806186fbae09004
SHA256a5080653d209c718ebed8c21954ed5c2633b01335be10df487aa92b140b8d288
SHA5120ac31577ae7ed9405792843e52bd56dbfabbd9838c079f4c10676536c3d395c40d2713548a5d5563b66f69f4c9fbd7976303bcb548f8ed36e5bf04f24d227ecd
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
20KB
MD505197e9427acea2ac4dc812f97a8f078
SHA13d2a38b79da52e57783360f195ac3e7c85edefd8
SHA2567bdfd36b4f017340dbc84a310014381bfd3028416ff21c54f7ce0a35cfd38191
SHA512084d4febc28358d3ba6b0bef400f637b7f350381b8b592b1e412dd860d5aaf034c03ecfa87a064cb19dd8a42faade23c260e35a8660791011b7e51b726418ead
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f48390a5420e535a83b33316888c0d55
SHA16bd442f12913f2b6c33b5c43cbe155abb1c097a1
SHA2569836c690d64e523e8ef59602fddac2495c237101a091de7105dde335f3dce17e
SHA5128233fa0b456efcd93a7a906ad5bb9319ebf464dd48940cf5056aac5113e346bf6c9b32d2b4ece510c15dc1b887a8ba8ec39713c4317c89c662de7a717826af16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD558da1902a3d7aa6f7c97d30db34ed453
SHA152503584c5020b3a9753ce45bb408ec404114eef
SHA256a3c5365d59ccb78c39fa817425699ba0827ad2c30767681abafcf193ecded469
SHA51216b66797fddeacd829a36d6f1af7c958f751e4d1119b2fcd6569a4f7af519f08a161bb04b0a89066c77d9955bd7e0a22680e9cbb32f6815b3df02b751d202edb
-
Filesize
1KB
MD51e9b81d93b0da78ad12cd64504c62601
SHA106ba4c88effe32514f669081ba9d6e509501b577
SHA2560054a0522b0594712e1ba31c047776bcd8c9711b01cd367268a8cde150d8b231
SHA512bf70506a678b0871d13fdec398695ed2ae8179e4029e693a09da3cd73374b175111e2776c50e48eeb3711c670446d9159f9bccf60a14e413872be6b7ea6a4de1
-
Filesize
5KB
MD584f4ac60ea43ebdd03260dbd02846edf
SHA15ae5b19ce7a9ac66907d9aa71899cc27bbc5a269
SHA256927db2326b651601b84907763214d93c33c622f61b451238fbab1bd520d69794
SHA512720cea253a53e412b5aa8fec1509506abb9e356421ecd7d6f12b5042c48f42158b354486a0275668099d7256273716b3391f9e647810bc27fb088d8603cfb79a
-
Filesize
6KB
MD5293c7b92b999d4a54523581a7570b4b2
SHA1d5e561a9c78aaf03bada6f2bb14b861576589393
SHA25654bceaca520b4f6215c15ddfca7914ec47975cd0afa81fd8fb1f28b2ed496b5d
SHA51296afd7c53920c90830be08976613e26dcd0b4e1d9428161a46739229bd59dc26e1a4ce36f4479466371eee187e26b35ded9e376111ea43908c77985e3a8dba48
-
Filesize
6KB
MD5f23c3e509c21b9a825a610382df4dc20
SHA157c59587ca5d9116a89468f808dd4ac761b1ae6b
SHA256115d42a266dab682b311ffef680ed4fb54a6779f98ce898a9ca2047fe9809e90
SHA512934bfb15319bf9815116ccf297d3b70613b81b4140738720247fc86761f106ae0ce50418059a201d3c7b528553222694e37519c54d8a017eb4eecf10b46cfb3b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e621603773e9011598f7392d1ce7fa9c
SHA1122ba2839a44645f673fda20412d16c9415e3b9b
SHA2563b333c18622e04b2336eaf32fb6541af1a3cd272ba05af05ffd12407552da0e3
SHA5122ce9cc46f3f289392b3802ffcef5cef479499a3f9d9519859dfad00769993f7100f0529eaf3283a9d0d959ba936cb70e66627267a41bdec26ef941befdd3e494