Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
88e7fc67ee79d9d3f59929e1631c7067_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88e7fc67ee79d9d3f59929e1631c7067_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
88e7fc67ee79d9d3f59929e1631c7067_JaffaCakes118.html
-
Size
124KB
-
MD5
88e7fc67ee79d9d3f59929e1631c7067
-
SHA1
e46ce3caa6b9c0cfc60c087dae4c2351c87ee427
-
SHA256
d4bc1b76ec3feb1b57e596bc2ca1deb6b0b6a661bf7c04c712b65e8e3cfe765d
-
SHA512
f24cfcf26b3144a8fb76ecae1a0c9846fe463107dbe0e0e1e38f22b1f24c406afe29b8134b96156ae29f0db9460c10410845af05af79dc94d6dd6aabde081619
-
SSDEEP
3072:RJXHShorhodbnckaYJNeMcTfgrvMZOFYaimFNajISZOFEyAUHUopiLF6vZGh/igU:GhorhouW5vAfigXk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4444 msedge.exe 4444 msedge.exe 4284 msedge.exe 4284 msedge.exe 2152 identity_helper.exe 2152 identity_helper.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe 544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 3924 4284 msedge.exe 83 PID 4284 wrote to memory of 3924 4284 msedge.exe 83 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4388 4284 msedge.exe 84 PID 4284 wrote to memory of 4444 4284 msedge.exe 85 PID 4284 wrote to memory of 4444 4284 msedge.exe 85 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86 PID 4284 wrote to memory of 3636 4284 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88e7fc67ee79d9d3f59929e1631c7067_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb7ba46f8,0x7ffcb7ba4708,0x7ffcb7ba47182⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2316 /prefetch:22⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,11130805869533757951,9066808600360975365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5460 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5631478f8402b0c4c4a7daa0c39c84fe9
SHA1d1d5d1678ce4cecf76ee01ac8b48d86bac376057
SHA256e8617c26630d1000dace5b90c696be83a4d230d2e44fbf86b1de464958363f23
SHA51270a15f03468860c365a6b0164a99268883d5529a0be992719895728c8383fbbc70212671570e4a88db8d6136e81682fb62ea0d583edf6806cbefda368b998450
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a45407a3cbbe380a249ba79684879017
SHA108097c4984c966000649814e96a241a321ee0210
SHA256225f74d2b3aba80ffaf5c55a049fc6fc04e50aeb3072dbf26c886c1043c1735f
SHA512e57ca828796382d9a2b481403b8b048302c7327761858fe2409d80c39678a8e48b5362de067fa4278167047d3589b33b1522b52d763b39e3850a6c3ca162b29b
-
Filesize
2KB
MD520e0692b792cb22687ee2251bc040d79
SHA185434e0e1ab1c4d9e86b264a525ef82527c0a0f8
SHA256505ec3854221f204c8291390096cb2769dda058a7dc08a7850c7f058067f870c
SHA512ae0510b4362b6315834530b6822e12819175c054035d13d3bb93ba7894006afb67c7ddf08e4a042da654eaf12fd87d189fc2333a5d291f1a942c555571dc85ac
-
Filesize
3KB
MD5b3bb58b74c4c8fe551fd1dbb4130f9de
SHA1a863bb5a0ef3c465ebbff5ff058a76bc6aa44942
SHA2567b7c37aba4b7c95b2e1c16262ab3b9c99d6131112b9a55aac040e6b6ba9ccfdd
SHA5124321fad254f2db563d6f0885c0d1100082d304431bc60fdcc9a9e5aa3f3b8c4531da8ede7eb8ef62763029069afd8eab00127eee64ccbe30d01f1736547ffadd
-
Filesize
7KB
MD518216517ff6fdd5725a0386180d69f7c
SHA1476be5876c4828fddfd68788381e7fbcb9cfb456
SHA256fd789553e8eb87723354557f9343a9e80a04677d7d2021a016f68701d5624a8d
SHA512f51383cdaa5d714d2518a0b47075fbd5100150fbd48964e1fb65eb0bc56ab9b247da87e73f6f68342b535aba897cdcb2dc142ee21ba1bd446f42658031799f2d
-
Filesize
5KB
MD5fd771bb61ec781bb5a782f06563a13cb
SHA1fcf53de4541a74307cee8e6123724cf423481e84
SHA2562ea181f33c24e525b5f144788e25484683a09ee94a72335f6985cd90354799b5
SHA51257cca6a37804d8f26e343c421210d7bfc8dbb2793be7f28ab63781f2132a7733e622f692237d24cc3e22445566ff4963e6452de2986d6474adfe9dea430ca8d5
-
Filesize
7KB
MD5d79eb04b03a9c8968090230c57bf2ee3
SHA12ed8800dd9f0eafc58e12130eef3a7e79cdf98ec
SHA256c67e57d8da33dcfd74cf5ac5c95e0747635110d493fe75e85f49778eb1874fa8
SHA512b8258e9c96f09fa320020d8252c4741ed388150831f0ba8b4a0a82484e337bfe9e2915358488dcc3efc3d432608eafedaa074fc9b80d8fee1c96db19d8d2bb7a
-
Filesize
370B
MD5084bac68d665fc35d85896d680d159ae
SHA159a233486381cfb8bcbaab982c979a4880ff1874
SHA2567813d8ac2b3479ad869caa4b5e37f6842e0021efb55e249ed1a5ed7cdfa1c0c8
SHA512ec52761b884d82eb48b7efb5839756050912a34b759c446f138bb3a9b537094fd78de4fd01d2b8eb5d76bc66567846deb72bb839b45e3cfdb3276c07e65eb8cf
-
Filesize
203B
MD5345a99ecafed8504f1345aaa56b1066e
SHA1ceecb91bb6a835ca6669ce5dd5c23fa9cb7ade87
SHA2564bcea36c803de80a3d1f961a57d0992f25bb791e4e12122518f6ffcf4ec803ae
SHA51296168a278573007997ff0787e57bd455203a669526ce9b27e524b744e8b1efda8e60111355050860c54fcc8ac02a2fb1fe996552c39d102347480eeb08f480bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ffb3d19ad68bf6ed9eb962d42a250025
SHA1c425a0f57b1a780abfbe0f7e316cf925e24239d0
SHA2567f5090a9c34ec838ea52808e0b423734708ff1a034bbda60bf76288908ac6629
SHA512f5990ea7467149c2bf01cd874949db208a84354600e40224cec7ffe63a1f58e4313db1837d9022a4c5c61884c6b457be1b9cfe3c6902112d5bc2e4c15d3e4053