Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
79e5f94a4613867328e50c3ebffec3df_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
79e5f94a4613867328e50c3ebffec3df_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79e5f94a4613867328e50c3ebffec3df_JaffaCakes118.html
-
Size
48KB
-
MD5
79e5f94a4613867328e50c3ebffec3df
-
SHA1
a86f57841dff0242bfb23a0b3dc47ab116ac0bd3
-
SHA256
f3c9eae01db044bf824ae81709a2bf6fc539fe479c3e3473e26625888bdc27e7
-
SHA512
ea1f9d14434061895d1571508a31b4cea25655a20d659a7e8d1931ecd5fd45ba6652f60925487a1b4ed61dd1a03af0e4526716dc64500f1071450807c89352ac
-
SSDEEP
768:qlU3+pH+sw1znZMQfHOTSXnwp9RWp4nvayt/QdhnU0Hlx5hMR/rkjgiaNTyya/el:QJUzntOYwtO/r0/r3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 5028 msedge.exe 5028 msedge.exe 224 identity_helper.exe 224 identity_helper.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe 6120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 5004 5028 msedge.exe 81 PID 5028 wrote to memory of 5004 5028 msedge.exe 81 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 1944 5028 msedge.exe 82 PID 5028 wrote to memory of 4888 5028 msedge.exe 83 PID 5028 wrote to memory of 4888 5028 msedge.exe 83 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84 PID 5028 wrote to memory of 1928 5028 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79e5f94a4613867328e50c3ebffec3df_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9da146f8,0x7ffb9da14708,0x7ffb9da147182⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6560 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6868 /prefetch:82⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8986260731528804994,5193022377813471083,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD50c9768814ffc7fffd6e78c15f4b92aa9
SHA1c8e38a4ba88ce48d1e4a6583adb3fc6b6a43e5f2
SHA2562d3198f3ea829d8f0481bfb994325068e2e6ae4187ba2f3a367e47e870ad8c55
SHA51243978dd21d6165fc64b528c85a1f9fd94ab3316e87ec9e8671e1752324718dc835f146b68c09f779048cd958034b2db1a7fa9718656249b04da3b8f4a8aed23a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD518b67a27b44c621b2c1612b0c9bdf4b8
SHA177024ba7865d6a3b48f1be2b284be13113edcf4b
SHA2565935305629d43579185023a7858695762e2f93ec6258007dc8f49c5a826a6c59
SHA512fdde735bacbc1200ec6c6de5e87540c8a8ac7a21f3e5add8c49c9f5d5cad4c703b5c183ffb92465d91167887aac1de1d1dcb84581cc82dcd1bb176591516e40d
-
Filesize
1KB
MD52f42c89eee5be09a94d90733996393d0
SHA1753351231288cd1a08f547a9bdfec036f8bb08a1
SHA256a07a8f8f7491280b6459722f664658a1b12a7c9a9aa02acde1576b70c4267097
SHA512fac5e6c16c963ce8b22e434aca35d0830b6765156b86846d504a0bf77c61ae7f62eb56813616f775c2051059944877cbc6011bad46920948aa891efdb056e51b
-
Filesize
5KB
MD545b99df2a97b9837934cfe2209dd2f01
SHA1025165413c0c26b8ea2d45cd0a64c44769e820c9
SHA2568cf79c64934b1a7e3e1bec49e1c03551efc7ddf6b79ce7fe16ab550500ff87f3
SHA51247678fe540d2fa0116497f1e51bbe238bbe32575f7e24d796d13ff00f373f48c5431581e556fe190e8dda0e7ce763c97a35fd6b8c44071986c3a0a34c8e83830
-
Filesize
7KB
MD5228bbf24f45d3aab7f17727492a8ffbf
SHA12c37df91a158ac5c4f5223527605ac062b5b632b
SHA25665556c76f8875a6350f04f75b64c3f5e423eebaec441120161235d76ec532e0f
SHA51286718416f75205ab4d8679d0327a1b87c9a274106706b62165503c079022816f736d3919f193703fb2135ba37149c75dcb66a50c6c7c029c244677ad70293865
-
Filesize
7KB
MD5003621d8b58d72b56dd934ee0862b79b
SHA1eab21df7ebe9c86e1c15f9dc350f850f3d945017
SHA256ea4fc2a178fa96308c4f833307a849643b7842b8ea7713828dfc14c87444e97a
SHA5120f185ee52cb793108783fa9cacfceab35c9e39ef432d26be4d3d7fad9f3b386c162154b947f5bca9021cd3850942985ac1c7f7546ab364dabfaff4f04d85c80b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD505992dd56fc3cafcdbf219a1c567f97a
SHA188c78aa42da0115cea331f8e94607b0bc4e3cc21
SHA25686b66aebf6907c5304be827c3e0eff067465ed92ca1bf4f586986e0ee267606c
SHA51210dfa98f69aeae41ad24ad58af8c51163605094db3a033d3b53538da36a1050badcd03005d541b12deacc575d1f43e3872859f5dc5f0b3e8f66826b678dd1091