Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
b5423bb60bff108de0b047829df1e9c8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5423bb60bff108de0b047829df1e9c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b5423bb60bff108de0b047829df1e9c8_JaffaCakes118.html
-
Size
57KB
-
MD5
b5423bb60bff108de0b047829df1e9c8
-
SHA1
23d06fef2846d990b81f0b65a2465c9833a272d7
-
SHA256
44798ec862954c4189ff6a67a974c4384ff31b52ffde0ae04d491d8c6f795931
-
SHA512
d9a564784ff5aa376363344fc44282b5bee50956016beb2f4a2c837b074176035a47980fe49aa42d512c5b75f7e691a986c5bf74370a21387d094826e479feba
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrop6wpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrop6wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 1188 msedge.exe 1188 msedge.exe 3232 identity_helper.exe 3232 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4172 1188 msedge.exe 87 PID 1188 wrote to memory of 4172 1188 msedge.exe 87 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4404 1188 msedge.exe 88 PID 1188 wrote to memory of 4588 1188 msedge.exe 89 PID 1188 wrote to memory of 4588 1188 msedge.exe 89 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90 PID 1188 wrote to memory of 3004 1188 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b5423bb60bff108de0b047829df1e9c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xd8,0x110,0x7ff90de746f8,0x7ff90de74708,0x7ff90de747182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6728 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,2340756366898948201,13153787678792036052,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5454b7634e395ac0da5870db760613adf
SHA1ea181a0ee9728af61fec0f62ac18a3e2b58edb55
SHA2561f6194204dc20e20bd63502b4684b14b6169011d59d4f932f40c196eae42fb91
SHA5126969d1aa0b28d779ff808dda60d945eeb4f7cad97150f66b9a35945ea6b7ff6fb7103c62fb331f191884d47d21da70260009e90d5e09a37367a142667da29dd3
-
Filesize
2KB
MD58ced1aeabbc13886a6fb09ad2f8c03e5
SHA1cd944568458fab783dd125262ac7c24183e210d2
SHA256c6f14ae67df3d01fd9f7745b515cd7d90fdbc049dd757048324a4a60de471e6d
SHA51211c63af2496098ab716da48027c416a65fa55b8c673ffe4d6b7615490aae3a7eb2971d7c4ca5e82efca433dbbce8b0972f856e5efbcf5a6e3822acfd55354109
-
Filesize
7KB
MD5a2bc3e6fb3f770fb98ce58578e821620
SHA17cad513470c77ffeedac505df17ecf60a8135fd6
SHA25628d30dfff98f886a7ff1df2075c0a631c31efd74050e8620126810875e60d46c
SHA51266eb2ecbf58aa1fe8ed8ab18377e2c51e442f89ed302f203e76d5363824c72d78afc71d16fd427a0d908ca79f06f4aab8b47dd78220a84917a2afd7a19fd954e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a7cf8f0b-ce34-4bec-ba20-e1c9f95ffa0a.tmp
Filesize5KB
MD52661f0e5dca9cf311c18b7ee92cf9145
SHA189975eda4622b9e98ff892c66836cf690bd02c13
SHA25622df5514d4a0c8630fc08af4e2503c39fed7b71f83b3b6966704a8d140e0a6fe
SHA51229334e71ceba2b20f02c2524fcc05683018c8d325ac23e43280ebb56078bc1267a5b6de1070e33e9594cb772b6adfc361db40d6459ff15e8a5306fdeae6e1799
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58d788d4181eaf80a56c93b6b487c313e
SHA189caba098fb8856e4c860709702a1100a9416295
SHA25655c5320cd1f0fbd939427eea624ee8e16ef25af4509d84dcc58448e1dd6f4503
SHA5127959c06550d7fd865c904d757ef7913a51066fbdbdaeb8e4fbc30f53b17275563329c786a9a19762db7e689691483c01189c2a07451eb8a20ef2fd7778da69f4