Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
67edda2076f25252c97904eebe71787c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
67edda2076f25252c97904eebe71787c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67edda2076f25252c97904eebe71787c_JaffaCakes118.html
-
Size
55KB
-
MD5
67edda2076f25252c97904eebe71787c
-
SHA1
d4c434e5f3bbd49cce21513b284ff964f95887bd
-
SHA256
ab3ff4a3fd05059f12f6db4e23cbd6d85be55a8217df2113946ff347f24acc5d
-
SHA512
c907b1831687f6df6ed1bed08cfcacd2773615371f6146cb8dddced30537cb0610defb1f015d9eae4150411839894b201ea36dd120300225bccfcd3f552b3ba3
-
SSDEEP
1536:a8HH5E2+2VA8x73F7Zp7Szr+gRmhCtkDZBcZk:ZHZfZVA8B3FnAagRmhCODZBl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 2796 msedge.exe 2796 msedge.exe 3596 identity_helper.exe 3596 identity_helper.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe 1508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4016 2796 msedge.exe 82 PID 2796 wrote to memory of 4016 2796 msedge.exe 82 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3688 2796 msedge.exe 83 PID 2796 wrote to memory of 3284 2796 msedge.exe 84 PID 2796 wrote to memory of 3284 2796 msedge.exe 84 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85 PID 2796 wrote to memory of 2424 2796 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\67edda2076f25252c97904eebe71787c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10589744309504991664,18189479165199151114,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5456 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\193adcd9-17db-45d5-b34d-a71912396957.tmp
Filesize6KB
MD5016a9c5acdbca39ff8e614b33c54b727
SHA102c29fddd1780583df1f34c23e792a4c0141c163
SHA2562054b9c2b19af5b3350564940b2fa3a2980ec2b9082d4f0fcc3884633dbef1b3
SHA5129b3f563a397572a0bdb7dfabcf9ddef35c82654067144e56ca6a8e11577a7ec6daec0eec337508d3193fcd4ef4f0b05a0cce012762b9eb70d9b7ab320bff5124
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD574c573a9fe293b743bf483431bb2a9f5
SHA11b2810c252e7a495973b78b8f1ca028d5a2c5986
SHA25631c0bcf74163f8e8e583f777f4c5d282644364250d8ac0bc67f25d73d548039a
SHA5120cebabe0e7994a5c259506b307f9b499237482068e6b1dae0d544601bedbaffa18450924a30684c4278a4f23a35b481d63662083e29b1772370087dd4f3e68d8
-
Filesize
2KB
MD569e1a8060ee5ab1f355b60dc771d62d3
SHA17b292d5c18755b40a4a686e6b259585645994ab6
SHA256a70faa9323ba78a0e5f1f985ce53a4c686733d880d3173505cf6c222989c2739
SHA512dc5db0cbee530343270f31416109bb286366b276f6518492f491270c272f6cb1f513f5236edb6dbb16355c6d97aa53c687f5088844828f000126271c9c63394b
-
Filesize
2KB
MD5aa2315ac1fbac8ba85d9aac0e8c3506b
SHA1f66e8b720b7a0d4c5f8cb7cb946f22400639463f
SHA25696c0066464b38ea9dbab123fc2ecebb5077beed1c2ae4fc417a4e8bbb7062d15
SHA5120a90b17e7e3c0b1f2956cc5d6c3f9480003c2e21187902fcdc37956999810dee5d99ee4926260cb333d8426aa85586c11193e7248fc7570061aec1c7a21f3977
-
Filesize
5KB
MD54fd08f9182466fcdf5e29670db3b3003
SHA155cc2dba8743232e1199ed53dfc719df0471d13c
SHA2567707994359bb449bdb4733229cfcc0af224de4242e358ddb9e7e2ae63145cf71
SHA512a6ba2c53c06366512a4683431d24300a85cc4c6aa25a573bb2b1c96a30d55ca47e22019abb5c37be89150b00782c7334997785645f95ccc5dc74b04f20efab98
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543973e304c54d568a44f383a45ae79e3
SHA1225bb3243d879c7e91122eb41600c63a32f8648b
SHA2560cd0cece54fc6e7cf31bd75ac3df3684465289eb9298cfc8955d6719ee7d662a
SHA512435a1c35a8e36a66e1f62a605635276b589037464e92894f705237dcd230b2a9683b8ac47d3c04811135a1b52b4344694a3375adabc53167faa2b1e7e89a3b00