Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
f594954314da5099ad6d621ddd99c367_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f594954314da5099ad6d621ddd99c367_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f594954314da5099ad6d621ddd99c367_JaffaCakes118.html
-
Size
28KB
-
MD5
f594954314da5099ad6d621ddd99c367
-
SHA1
7656d1002bf27c45f9ff68aff3c3550287be09ea
-
SHA256
f0c1f36eac7752371dcf97b5fa4171f69af19bc80a88b7e248ca3509da714d86
-
SHA512
c132ed3833814a6f1f36f38e103ac413d08b148cdeabdd63961c4bbedf1c72b13cc0de7984ee6a6355f2476c60d99f46001b51f80c6d1e477ad251588815b175
-
SSDEEP
384:SW5MKpv42JdvhjROv/kTDKOmmmqU9gLYCge3Ay5f:SW5MKpv4ZvMTGHmFwq3vt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3536 msedge.exe 3536 msedge.exe 2840 msedge.exe 2840 msedge.exe 4880 identity_helper.exe 4880 identity_helper.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 1112 2840 msedge.exe 86 PID 2840 wrote to memory of 1112 2840 msedge.exe 86 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3844 2840 msedge.exe 87 PID 2840 wrote to memory of 3536 2840 msedge.exe 88 PID 2840 wrote to memory of 3536 2840 msedge.exe 88 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89 PID 2840 wrote to memory of 900 2840 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f594954314da5099ad6d621ddd99c367_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc888a46f8,0x7ffc888a4708,0x7ffc888a47182⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1569013246880472468,16334231221934766641,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5ae31a275bc8b5bd05c21276090b0cc24
SHA182be9e122b5a86c0b3b15e2b1943c0933ce0d3b2
SHA256becdfe67c4e18c78c7e7e7e35f637b2ed8996a08ce9795b17e697c5b98959a30
SHA51204c6e840481827afb36a2b5c6ed1a3e836cfcb52bcab0c7a4e10a16555bfa4350fe9e2a03615d29473b44ef00aa41968404b367a750bb882d2c7a1b044b66343
-
Filesize
2KB
MD5ea2450935fc1d989a441e6679fe86dda
SHA10432d9a50ebf67b117f8526fbfd3358eb735bd00
SHA2566e5f7bad9445bb42496f7da7136923a4ad9228db348c98f3828083778222c3ee
SHA512c86d9e3173b1190766d35e9da9f45bacdd935c9b7393311f7a3cee9c7a2588e82863cc19bd762ee23173cbcd48d0a1f75f30dfaa82e8433f8189fe527a7c103f
-
Filesize
2KB
MD559773b6807c15d80dd08f3f33ff1b792
SHA129e47833486126365064f923bf09f385f975ac82
SHA256e12e649c69122257d4ff4cb7bbc11c053854b930968692907b475a2cf15586dc
SHA512d304a1b5947616ccc5ce3396cb13e000ff2d71784e109626753790cc671f4a2c368e6d76c644cb307ea2e5d4c2b049466e9d66cc941c5b730d0d9b825bd26d62
-
Filesize
6KB
MD50221c769851f9b69e7fbc6203e551e24
SHA1ae35a3194b5ff709cb61411ded0df733dc374614
SHA256398c2fbefc8bf4f8bde6eaf50eee6b5ef1ad5e863c2fd78f8cfae151dc3ea0cd
SHA5122dbcef2488fc8e20a8721fdc3ba22e3167c23c2f9afffbe67616ca1851aecb43fe914e688432706c66842fa1cc5f102c9c0ec724369b7e515418303a4c6e8b99
-
Filesize
6KB
MD567e896487dd4d795d909a20abb663753
SHA1066c47207ecbbc1a98b519e834e74052422a5377
SHA256ab7cd645069de2867ceeb8eeee0915a00477ef677988c9960bc89d9f3bf3308c
SHA5122d0fef2b4342c2e54fe257e2a354bf688986b3439c8814bb810eeee92b0b348c25c2c5218e3c14bc1c26f4c46c69bbf207e9bd136d781573373f0071a42c0b83
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c84d58158319243a9d4d81ec77c7292f
SHA171458e994856ac6af445461d68e476ef085905e3
SHA256b6e76f24444fc0430f40d0e7d9eda8397a06bd1d121e8a1b090a0bbfc29d662d
SHA51251654d0ce30eeeb5a9990b11f48a057e7296215d1881eebb4ec960b6f28cbde74569083ff5b9b9615f5574dd1c42cf48ccc9fc4a1954e66839f7cffb1644e537