Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
75347caa089c508622fc20e3b2261523_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75347caa089c508622fc20e3b2261523_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75347caa089c508622fc20e3b2261523_JaffaCakes118.html
-
Size
190KB
-
MD5
75347caa089c508622fc20e3b2261523
-
SHA1
eaafb449da61af6258edaad2d8ab194edee813a1
-
SHA256
239a959509bbd677a1130dab7b9032bb908a7720a138b09cde0c09b8033a4c9f
-
SHA512
01ab544d1a2330f257d7275ca3e02ead87cf1f47ec82b09cee39f5724341fe8b761596c746ffa312217ade6b9a825a791bee1a741af7342b028eaf32c35351c7
-
SSDEEP
3072:nxDNvG8rm/GXmNJUNBV7RQUe+EOmlwgnLIgnjWyHb/th2wfngwDBvR/Q:vVXmNJBYuQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3980 msedge.exe 3980 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4860 identity_helper.exe 4860 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3728 3980 msedge.exe 82 PID 3980 wrote to memory of 3728 3980 msedge.exe 82 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 2004 3980 msedge.exe 83 PID 3980 wrote to memory of 3528 3980 msedge.exe 84 PID 3980 wrote to memory of 3528 3980 msedge.exe 84 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85 PID 3980 wrote to memory of 456 3980 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75347caa089c508622fc20e3b2261523_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdad846f8,0x7ffcdad84708,0x7ffcdad847182⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7136 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,9372595886846102124,8090361824936884935,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD50d52c160ac1a99303d90196e2b19a54d
SHA15cb70fec980105d5843ada46fc4720d9827b780f
SHA2568ba8db5694e18f215e78bc808c7526a827304f2246c5b61d620b91ec1091a4fc
SHA512de5c013b9cbde550cdedb94d925088af4d982119ceed8061e2e82a382ccd3e0de2f6a539115b7391ee035708b7ef1754d4ccc832b819f9f1c94dc07dcc50df7d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5cef9c67e8638786fd60ad4130c781632
SHA1748c53d217ca13d48253e682912da4ad2715d3c3
SHA2569a13b14e96f4f235c8070c60eb9188f701df1187abfac1d407e2b192548fe3ba
SHA512614943690f5e7e7ee9773143bdff8ced3fc5e5cb397e196063e45f6745c8d6f25dd8e624df4ec3359d77b453bd33c171dfffbdadc4e81749cb4425f6acdbb9fd
-
Filesize
4KB
MD55614b944c3095ee99d2d4e5da18f5368
SHA1a778d72ac7b6a0dbdc16ded26949e5612a2cf937
SHA2564f0fce0c115bbbd292c3e8bab0b1f093913d7f8d85bc5b67227ff3a8d705bfd3
SHA51295e123c1951e29718587d2b2b3247b78767d7b56f78dd2c59451835ead62de6b171e33e4a74302aa0231496cf09ed82dd3e5de599590693028a3ecbbc4e2e4d9
-
Filesize
5KB
MD5e5a6124a6faa20657db63867ddaa831d
SHA1114ea0204a6f950c6c7475b1510bb668bb138a05
SHA256e49feaa2a6a76823516c16d4d41564c0a074a7122418c1a3caa42be01d7c9e3e
SHA5129a4176001baef2843eb458dfc86fc2a905da07a36f9cde5ad4a68477c6c158663a1fab0243fb9d200fb98d86ab1cf0080866e24ec802072be836c5b451368a7e
-
Filesize
8KB
MD589993f9f005aaa500643f308eec07408
SHA150540f1ea7a2cf0e570fd514f5069f563d7d95ce
SHA256e34fb631a9a927831c438080c17a001c9add35f7a2902f160c2f90dec5170a2a
SHA51276565de78acf851d65880dc5e40009f7fb8b51e28814285ec040635375345136e16fd225698b7a6cb1f578a5388fac3a8516936c49760b08c671376899b9f937
-
Filesize
8KB
MD558b9c3c14bd14e24e97c7cc5b6153477
SHA1213468320f41b87ea9a926a026c8eec3fdb3aca1
SHA2569e3a36bdaaf76d7ace3147868d0bd73037c90dd762f8d16044f015d955c3d99e
SHA512af1792a2a913d3d922a1d22372243719ffb6e096a606b8783a0202bd95fb8fddf77fdd0f247a97dcf015f39c90b5bd76010d27e2b30b2516893027cb530b1ce4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56cc62b6ae20121795f3fc9c3aead5fad
SHA11a9832d119af8fa48bdf1f4cff99729126731e4d
SHA2568c6933c1e5ea7046e9279da45df50d2a482ea3e0435984c7ec3017db3b9c7034
SHA5121b0df7253a3a6498fa5457233e6bbd0e682ed7d28215a3d98ce6985ac5f07e0dcc38b2326b467b01e98429d08742f222dc0ec0c2a3ffec48193b61481cec88b9