Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
984d9bd1f9b02a71da9720d01aa0a0bd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
984d9bd1f9b02a71da9720d01aa0a0bd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
984d9bd1f9b02a71da9720d01aa0a0bd_JaffaCakes118.html
-
Size
66KB
-
MD5
984d9bd1f9b02a71da9720d01aa0a0bd
-
SHA1
731cef70104e534fa250739bec9573c447b04c40
-
SHA256
6b77010cff910cda95df774f82c1324126f4a82f3ae9066b3bdff86364164ecf
-
SHA512
51af0a24a4590eed3f2f4b1c841f9b94c615ce09419858e066ada1ab4024658d00a981446b86aba33539a710593caf36e947ebc3b570b622061e5dd752f119bf
-
SSDEEP
1536:3nzMpjFqryJw4UesOyYN+PMeD+Y6q6XBtrW:3zMpjFquJFyY5Y16XBtq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2400 msedge.exe 2400 msedge.exe 2172 identity_helper.exe 2172 identity_helper.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3168 2400 msedge.exe 82 PID 2400 wrote to memory of 3168 2400 msedge.exe 82 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2628 2400 msedge.exe 83 PID 2400 wrote to memory of 2864 2400 msedge.exe 84 PID 2400 wrote to memory of 2864 2400 msedge.exe 84 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85 PID 2400 wrote to memory of 3660 2400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\984d9bd1f9b02a71da9720d01aa0a0bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b3546f8,0x7ffc0b354708,0x7ffc0b3547182⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1752 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13708377748189151924,13653039781737921453,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5cab632a70159ded55738c46da2399dfb
SHA10f933a12569158710927360a0a8d2b3679dfc524
SHA256c1c009b741777d17e0e218437e2bcc6f2961cb25bcd5766c83306c60fac6a2cd
SHA51296b4ae888dd482bfc02918ed1912c31aa9a92c1887f8d1a50dce746de02d02c89ac31200ec159ada52e72c281f28322e9a9c2b0033492e1874ca30d6ddffa70c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD57c4aace8be37f43e8a33698f475d4e48
SHA100a758bd3309ec672da8b6a96a98712d29239ea2
SHA256215c0682b92cf9b0e5bb5a0a2324d5dbeab0e67e35572545375c37a58134bd95
SHA51289b4a724ad8822fbde5ba05792d6058ee21597c6264dc01b32c6315a384bbd4875b90e66cb21eabe1392e73f1d494ba9ead72ac92a9306334e7f7679d611610e
-
Filesize
1KB
MD5403100f71eed8d5107f6e09c916274f0
SHA123cbf2e35aa27aa2572b4495e1c221ce612d4132
SHA256ee1571f42ed13f880f035e76c326baa5c83fd3085177ffe6ebacc754b4bb2119
SHA512c68fb7798d2c121f7d280fac4cd68c46f8fc033856dff9fddc2c99a4ec80a3eaf86733b59c58f858ede5f279611ca5db3cdfd39c69bc8ed4b10851cedb21be23
-
Filesize
6KB
MD5fc6fe38790cc9fb1e8d059c026a84e98
SHA1f40bf8f069577306a302940d9528553a17849fb9
SHA25632df3693ece4c4e3caeec69c41eb1934185265ab673645d3b40d6e4a25b4a8db
SHA512be25637b13355c54806c56d5821ffa722ccb7b2ba5541c6783c884d2f08a849733c6b341fd4d4f7cf85465da46d9dbd8629f55c12a11d7829d0c1b75169551ad
-
Filesize
7KB
MD567bca122d9708179f090794ea79f9946
SHA1c73b65f773622c6fb73b2526b44cd4139c36c815
SHA256c0b6fbe733191d13cbbbaca61e5bfd9f221e203a5d07ed39c28fcd501e7610e3
SHA5129dd19cf3e406f80ba4bd9dbeff748770aa041dbead56e3c2445bb7fc284a75bc2f49fd78cdb81ac16272201cbcf14590a7bafeef45702b2c4ee7f095734c0bfd
-
Filesize
5KB
MD563a84b9221f8de6b6ae8ad5a76ddbad2
SHA10b8f06ff1dbfdb8c34abf8978947ec86afa24c4f
SHA25619d036fa410ff1939b14a14f23aa5fe5253307633db6238c8b403afcc1243a06
SHA5122720b595a074f20dfb77abe5c45d995aa090b13adc52353ab248df77fa5c67f34a51ba970d85627b52e31bca8c11ef36a547b46a02251e82d8e59bf956a04ad6
-
Filesize
7KB
MD5bf54cd1893c9c04fbe75d418d296f8a6
SHA10a1cefb9d7f762a77d5e5d3dbf3c1b71312806f4
SHA256005e65835e4d8bc0de21f8d88748fbc88c25b2c682823814d51b92db6bc050fb
SHA512addb8b38d6e7fbeeff15737f875b4664a7ed314068154892271e4dfad90bbab063f04b3457ca0766b5573ae8242e6d2bbc1b840e4dd7eb68c89b40cdee1c7a7e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD592940ffb680ebb2adaf5e1a24d8c951f
SHA1ad3a45feba3816bad19438e8d1531b0a3ff3ccef
SHA2567a78b49bbd644fe93caa52fc1259a9804b311b66b4db49ea1c9b5bbdda825014
SHA512a3e7d3076017d187915304244df5c54cc271f53cd7db2bbeb2f0622bbdd22f0378a633f967976ea697820fd694b801f894828c5b0b6abb833fa9e0ebe050fe9c