Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
20d72d5a387a9f93a3c60a75bdf17afb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20d72d5a387a9f93a3c60a75bdf17afb_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20d72d5a387a9f93a3c60a75bdf17afb_JaffaCakes118.html
-
Size
175KB
-
MD5
20d72d5a387a9f93a3c60a75bdf17afb
-
SHA1
99c2132cd1ebe4cc1cca803ec03f5daffca26a9a
-
SHA256
f06f9448f4cb7dea521f87c8bee1eb0c74a64987f5dcae01cd1e33ac9629617f
-
SHA512
4cee065d7b1f16c1171f9e3c73c41749bea94f208e6d8ea96537604880ea0c565e11fb77ee74b5940baeebe55916dd222bf22c78b31b161008f9e5174826241b
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3jGNkF7YfBCJiZe+aeTH+WK/Lf1/hpnVSV:S9CT3j/FCBCJi1B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 2608 msedge.exe 2608 msedge.exe 3572 identity_helper.exe 3572 identity_helper.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1096 2608 msedge.exe 83 PID 2608 wrote to memory of 1096 2608 msedge.exe 83 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 4448 2608 msedge.exe 84 PID 2608 wrote to memory of 2008 2608 msedge.exe 85 PID 2608 wrote to memory of 2008 2608 msedge.exe 85 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86 PID 2608 wrote to memory of 1012 2608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20d72d5a387a9f93a3c60a75bdf17afb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92e6e46f8,0x7ff92e6e4708,0x7ff92e6e47182⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11194669524976016610,1405894294582884724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5e01e70787a6602967700316d58197c55
SHA13d74dcdeff523ae45270b3802deb9319d996a46a
SHA256958d5295b20460884a9a2826418caeb18d41762098a184a2a7d50682c6943e25
SHA51295a74e8cd4a82ad3597f29138a005918ebbd7d34582dc7bb41c64a834f3a50b12fb7c6582982a3429465bf30998e13ddc2ead96d625ebb3064091b880ea7d08e
-
Filesize
2KB
MD59101f74a86db291c24003e2aa8174b0e
SHA1b4a0d6bfeea803bacca8776349fe7b16354fcef9
SHA256350bf37f77d44e9d6c232e6796338634efd8d8670e806412e1e7e2253a5a034f
SHA51248bf241769e56dfbbbaabbe864acc16f03a83a55ae60b6d6a55458e8b077beb142e911e1c8c6c25e8609314074418e6572ca0d4ba330685a2a1d68e627ad57bb
-
Filesize
2KB
MD54db6074800ba98522f1350b6c5b95a39
SHA1021d1a0dbf61bcbe6ff9c0e3a32cf34e75d84998
SHA256ac0c492d74577c516fd81c23ad6dab03ce1c4c07cedbeffde8d2d020b45850d3
SHA5122e3715a6f3fdbe92f36920cde68c2675a6f896c3ded9c1946fbbbb617d82d4b1c4a4ced6ca70b7aab7252ccebf4816a3a913d810dd3b5c73ada23ef205cbbf2d
-
Filesize
5KB
MD5779da043ccfe533123ca3bd04439e59d
SHA197beb60e320bdfa4f8e517dcd93b0e7ca80804b8
SHA25661df1181d4793986e014537ba1e6834eb01df867ede305220d4743cc894a3843
SHA512b28030095377563986dd59f1af11900b16ff91693f8696eed15f556863d926290d3d7040d27c707ba197abaa92783ab42ae3c157ae16204bb157c5146d73c807
-
Filesize
7KB
MD5e2b83dd3a7e4e7004bee55d95cfb5706
SHA185f588af35e9e9ee90bc08c4cdfc439c01b6011d
SHA256497def99705e85323bf52ef844c1cd2a3b4d21ddc848926afb24f5aadd9bc8ff
SHA5128be2557aff9235ff992e52f8570b7512114a2f2da37d93276c53863fe46fb43d65abd3274ad300967725442c1f739932b94cd759055708426540ecbd2dae99e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57bd047e11ddfc697ca40d5869676f5db
SHA104e5ba684341ba8c7789f823f04f5cae9cd99bd3
SHA256a6de81d8c49dabd1228bb6af1fb6c9747ccad73df868b5d080435e934085893e
SHA512e26bdfa43847479cbd031cfbcfa472c738de92b5893676fb824f51043efe501a9e05451dc9b44b3a587444d54babc9f3fd76fa62e4a63f36ed7ff7eb169855ae