Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
301ede0379fe04f47e86f2828f2311dc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
301ede0379fe04f47e86f2828f2311dc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
301ede0379fe04f47e86f2828f2311dc_JaffaCakes118.html
-
Size
175KB
-
MD5
301ede0379fe04f47e86f2828f2311dc
-
SHA1
9b9c83ecb7fdf778fa8435c695015b231703af67
-
SHA256
17dac6e06cf2d7e1c7a61075a65683e0f50662fd0c5c919e967f968779c9c614
-
SHA512
f9308f0e69edfb5095b3e96661740d044e691952374193971278968ba3dcb5f3f37f610e066aba9505ecc6596cf0de0118d02bed110fa545a1036ccc19031a0f
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3qGNkFgYfBCJisd+aeTH+WK/Lf1/hmnVSV:SOoT3q/FVBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 1724 msedge.exe 1724 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2336 1724 msedge.exe 86 PID 1724 wrote to memory of 2336 1724 msedge.exe 86 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 3676 1724 msedge.exe 87 PID 1724 wrote to memory of 1164 1724 msedge.exe 88 PID 1724 wrote to memory of 1164 1724 msedge.exe 88 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89 PID 1724 wrote to memory of 2044 1724 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\301ede0379fe04f47e86f2828f2311dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb324046f8,0x7ffb32404708,0x7ffb324047182⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13263581880760758979,2000457241603406688,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5c1cc6cb5afb41a816af8e2a9b0ba4df5
SHA19d1525d4e33c78284de8988f8e0da86a1742bb95
SHA256f4c9aef8572db5d6c1bad189fe97d8ba8ebc2479b4c24bf00f8a5210d11a57f5
SHA5128f0097370985cf4736838351f4679443764ecf9574da39d9a6dcae4c31de093426a3da491c5bfab686e014b60597e6d2ec5195116a05c6b0321d84d7e5c0b52a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD50080c443ea89630899b1e3d63977e8bf
SHA119a4195677d5d97a5b8f8a5e701402063aefec97
SHA25670c84a580b1a3e2e4d9f08a5d80d68596cd054c3e8e36fa9736161c101af1d61
SHA5127c4e99794dc1bd805991aa92d9f2c338026123f30e484131ac884df451ef2cd9ecf3a7984b1c476e95c5fb81ea95bbd2aeca11b6ff45fbfa6db0e6113c7fe0b5
-
Filesize
2KB
MD532dd5204bb019f0a693bab0d44fdb5d8
SHA18b93289d9850cc49cd770130d1926fbb20a8c5c4
SHA2567fe8d468350ce7bdbcec52e8c1475590c0fd5d5afdea36744442f4da3b200ded
SHA512f667dd2523602fbdbbc7a149e16f7e93eb1674690399874dba001c7978f87c4917ccc44a79d11210ab303255c81ac9799b1f036dca4dafc85393342f75f06535
-
Filesize
2KB
MD59f0627ae5555a7d194fbf01de2028b47
SHA13d968d9df40823c76f557c9cf829cfe9aca147a7
SHA25648609758035a25e503a3f8555db4668cffaaa618f8cb63dad763699b17e6e5cf
SHA5126ca4a2131a3afb6330bc7e57fd7035be90823a335ac9c6032c069dabb01546ffec77f53eabb73d1826a2366d2a120004854eea1b1ac347c59961a5b164bf3eb3
-
Filesize
5KB
MD519b523e1a3d0141e9558551c0837c32f
SHA18b45fe086ac610af6ab71b4c8c75059a5aac8976
SHA2562b96267dcb3d733e6ebcad815ce792955a20033b23dfb00d5226731434e03565
SHA512de2286226bd4eac5a91e7f1e1d754ae466bacb84ced0ad0f005fd8034d44910ff55f37b2befd06d5801bc48dc4737a0c840ff3f1c49a4b32b5356be0df9ae589
-
Filesize
7KB
MD5de55ac1091532f7ee483b6893521bb81
SHA163623737ce932add5ac81cb01543b5bc8cdf1530
SHA256940ef71f8205fce4869512ceb8e1a24ebbaf4a1dd2e78a440f79098f576b6d13
SHA512d142eb26986a9fd5a091db63aede8bd463a869fb3106e5288475a03b185b168bc98f66e529a1e6261924dc2e08283bd733ea78bae8d67e2cd0539b27c15a308f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b78b1a551bd1dc88e4ab81209bfa1244
SHA1429317e6f357aa57325dde923afb65af06847261
SHA256685fa6f7dc4e5ad688c0749a366a3ec20fc8a511e795742d0d975e713c7ef484
SHA51208550e87ea9723e9024ffb558433461b3d25df91ac4b516330dcd6952e2f1f1a009127bfaaf4af62e62325ce8dc724b6915df0d3c259ffeb6eb9a4ab45fd5b1d