Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
17e75d441283968efbe7441f096b74dc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
17e75d441283968efbe7441f096b74dc_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
17e75d441283968efbe7441f096b74dc_JaffaCakes118.html
-
Size
91KB
-
MD5
17e75d441283968efbe7441f096b74dc
-
SHA1
4aff26ac053e27092f1131bba1f1f025078cd1e6
-
SHA256
08aaa1db5126946a9db4f9e5cc3f5bb64850923f6939bf09dc110bef4c2fb308
-
SHA512
461fba160054265e9d19170695fb0df55bc2c6edff31eb6c7eecc6149ca3c0c2ab7aa0703cb0157bbc66283107b39bbb0c4421fbf0c9d527ef03b70e63764cd6
-
SSDEEP
768:HOcJDEpDFgGEcXVuESosOkVnH1vXSORKVBZIMjqQ0dliFtK29Bh:HzEpDFucX41ndHkORKnhKsFtn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 2188 msedge.exe 2188 msedge.exe 2964 identity_helper.exe 2964 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 5116 2188 msedge.exe 83 PID 2188 wrote to memory of 5116 2188 msedge.exe 83 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3884 2188 msedge.exe 84 PID 2188 wrote to memory of 3824 2188 msedge.exe 85 PID 2188 wrote to memory of 3824 2188 msedge.exe 85 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86 PID 2188 wrote to memory of 5068 2188 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17e75d441283968efbe7441f096b74dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf95b46f8,0x7ffdf95b4708,0x7ffdf95b47182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3736 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1244149736863886370,9119148405839420060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD59b2eea7c8a7652bd14837a66b1dd0e99
SHA1924672e3ff8b9218063afd2761fffd272be3e355
SHA25615a747419c194a4dbeda9d9f574d37e639a64c1d58c488d17d0eb2859750d4ea
SHA512770f07de30c261bfc3ea0530f4c78c50a6ccd6b4fca07f8eb759c77f10d32152ea1b1bd4d5776956cf1edb421e0e9c10a15c497985e3213494f347038738266a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5947b05c0fe7d91bf06442bab2d755801
SHA146f81e854547ace06416bcebf69575087eae7883
SHA256c632a5859ceeeb7da79c6d70d8145bae8f789ef7c6c6dd3a75e6d9c3befe1aaf
SHA512f1adbcdf0d6100c4a9e6deed545bdba75f8e8d4ce629bf53865f74ffa066857f1ed26cb7a8795400a83f03167c526c80cbec4c35bcfd0007fac3518153fefd5c
-
Filesize
2KB
MD5eca4ab2f5086aded6d4ac226341cd1bc
SHA1e29d60e2cc349d1c5b953af29e7ad65d5eba7512
SHA25646f328de10c9d0af91f87ab5b6fe5674003270ee844aedb9903170f069aa291b
SHA512c4d7ce73a552ca05f243b75e1fd04be9514e73902731c4459131519f21144c38bf43d3637f9191543ef87a50e64c0c40c4c46e3bb55c055b50971a5239e230dc
-
Filesize
7KB
MD5e8e7a18d784615627a991e5d353eab9d
SHA17e7520c9e53c9fa1b56072ebccdb283cb755f374
SHA256131a5554cf067cfd575d0a8d40390acb8cdc72b9ef5dfc3d28ceccf1662158ae
SHA51233a80c6a651f714160b636d93fe931a629df28d1260c762432482c61305ce82066c39deac977977537e9ef96b01ce2a1aae6bd2ee091c04f994d817652463efc
-
Filesize
7KB
MD5cab30b335152a9dfc1be9871295428f4
SHA16c55ba50b074cc68883c2c78b60f5ae8edf4b332
SHA256185e88d7a2579ca55bae353f71411b38236b94268d8295008e1c8674c8324b4e
SHA512206025009e3e597a02851dbca5bee5e56862cbd2e553c07c0d04085675b2fe880f84d756655006bfc62c6bd981101825bc4e1d9661401f891be971fa05db1344
-
Filesize
5KB
MD5e7c8afa252c0cbf49acfd009116e1883
SHA1a0b6b8cc659cde04638caa1a99c6018455d3849e
SHA256617db4a1c5193fbdc79d8f6dbf633be64aa7dd369cefa00d03826288427a213f
SHA512b6d6d018e6b10827ed9a5b4f314d2883c4ff465bbc9b973d905cee97a5accbaa7bb0c4c66448fc0f184ed4c0e1c4c1bb7cb3f0bd844327f0c4f37eb317751b5e
-
Filesize
7KB
MD509ac0abd2c6b20f795cbbb5e345153de
SHA1b5cf98af117d1fd0c5a4daa4ce59ca53b19055e5
SHA2569c6e3104e580a5ea2c2cfdb46318540ab6135329509eb8dd98dd1004865c8609
SHA5120ad5ba090e8f504ed7ed4a9a38de57408101981bf1b513b71177bca0cedb5a8b3cdf1e529e28af91ab3be00bdc4124eed77fab4b03fe1adddc723e92f9089430
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5268b79b29d3a5962a7f0eec0a15067a4
SHA135617ed54587b194767a7e2476f5e89b751e0951
SHA2569a77b20b0452c8a40b306cbf96b60465dc4aa439225baac204d290a46ad632dc
SHA512a4c77888c59a0ce70e69c68f10eabb4bb34654a3726ab0335728a845865cfdaccbe814d6a233f74d86c4514cd8de74e51845e3ae958c72b5ab3130194e985937