Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
74e7ad90295d246fc2e381b73b7e36d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74e7ad90295d246fc2e381b73b7e36d0_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
74e7ad90295d246fc2e381b73b7e36d0_JaffaCakes118.html
-
Size
65KB
-
MD5
74e7ad90295d246fc2e381b73b7e36d0
-
SHA1
91a4c5bf2bdeb2de533f519e6097ec6b219c4f8c
-
SHA256
680fb168b027739d1bfe1c8d167b9acc73e9d83300e71131979439a54d266316
-
SHA512
5a67b805a5349364fdb567567e49a78944166182e5f05c41684da734f155cc3567b5094a886ab0845ddd57ddae8aa234c143e08b00c4bc218fa1286f84f28029
-
SSDEEP
768:uy+1yHHvPZkMzWS/cX2N+KX+FndzSODSoE7gvJQlcB8KZ1JGjp5F5ZM8c:n+8HH5kMzWS/cX2N+KXsRZEkJQF5F5Z4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1112 msedge.exe 1112 msedge.exe 4396 msedge.exe 4396 msedge.exe 1440 identity_helper.exe 1440 identity_helper.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe 4240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 100 4396 msedge.exe 83 PID 4396 wrote to memory of 100 4396 msedge.exe 83 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 4856 4396 msedge.exe 84 PID 4396 wrote to memory of 1112 4396 msedge.exe 85 PID 4396 wrote to memory of 1112 4396 msedge.exe 85 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86 PID 4396 wrote to memory of 1388 4396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\74e7ad90295d246fc2e381b73b7e36d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee5d646f8,0x7ffee5d64708,0x7ffee5d647182⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4443347752807009284,12816246802672366319,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ed33ae2d342ec765c8becc973d214838
SHA1172d1e873d4b5548a58bc6e1d72156b8f4f5a9fb
SHA256855cca892cf821e455ce744e1df7ce5efa92cb9ffe4d72fe20e40ab4e398693b
SHA512bddfe071b8d41893083acc9913793d3385c23bd4ceef4ba5746d03b9863395589216dcd5f0dbba02684a7922066db3895227b5ac0cf260f0516d8d744dbac3bc
-
Filesize
1KB
MD5c3bf78797aebc488c2f3b1bd481ca3ab
SHA17f3603566198809b012aff95d88e39e489b868ac
SHA256f4f263f66120a659163da4cf2df09412b1b0a23fd3ffc2549d3f9f2d0a4d53dc
SHA5127c21da3c673a1d76d3057461c4d18b6ebe5709b2140cfa3d71e3b2c8d6da3abed29d0b09023cc5c450315de2f7b3cae9621a2d4fe3a89b823f4ccf899d9d3b67
-
Filesize
5KB
MD5df808d07228dcf56066c65eb0d34fcc0
SHA19a6c9a936274695ffb82d63016cfc4d6f8072a1f
SHA2564528422412d8a2278851dd7c5da94a955894c9feb8f75a27a313af116463f8e6
SHA512cede3f72cac877ea595a9c69a7c40e6bb7af57046d8a607bde3fcd63e58d3fc03d3c4c7f85efd306f776af1525bb4381230a1d85820021b69c83e0036550e464
-
Filesize
6KB
MD58727ae2f37ba52fdf1fbb721fdcd2aff
SHA116cf36af1d706564c171acd4d22122ac3889dbc9
SHA2567fdc64031eefc8e174800dbb19b85de487e13cea282a4964ecafb9772732a56d
SHA512ec74f1d6560da9aef3a90e5f07163a789a92ae5a314c199e8c93963aacc3e3a0755bfc87a7805afa8f1c3ab614c8a6c5572eb716e5ffe8e288d2e60b47c1f68e
-
Filesize
6KB
MD59393f49eb38a5d3bcb5bb3419a45cf85
SHA1439d07d02a1a330006e9d421b3957b596cf798be
SHA2563d951831513e30fd8ff750325158972c168e6a0c54a805088039d7e2b3aaaac2
SHA5125522a61d1f24369da16abb6595f4d10f6eca9e3078b6d9eb34ff0f98f3ae107240adde16bb674926a8edc09146ae9fa821e9ba89a487d0d8868d7aebd236c878
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54765f2ef3ea8353810fa96a07bf907a8
SHA1e87d2d09327ac0225d6ff3de6e63609744a1aa11
SHA2564d560f610f5f74dcf05e2c2a519d07e860699e8cb5637c4dcad80f964c68c35a
SHA5122d380863c196e2f16ea550fe1a24b697e8ba58bc3da431860b2aace1e7ad0352a431a56c94828bd86394ec89d6bd48f07defbeed73a73d5628cebd16657efe1a