Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
a17bdfc321af794c67601564e5a6ff99_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a17bdfc321af794c67601564e5a6ff99_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a17bdfc321af794c67601564e5a6ff99_JaffaCakes118.html
-
Size
189KB
-
MD5
a17bdfc321af794c67601564e5a6ff99
-
SHA1
5f7d1d633e03b27d35f1d2fb93651a09585b29be
-
SHA256
b24843a4b888d2f73d29cce43ada1d8a5c36b113c061b36fce771b31cffd5a86
-
SHA512
200b9cd38c1e15b1fa5a0c3b5b8d472ad52583519f113763cc77c82bddd22a096bdcad23019d73343f3a1c1e3b22919fee6d053b7ed3fa5618ac99cf859db188
-
SSDEEP
1536:QOtc6ltKLaC3rzqaSFActEcCkWGogxHVeeeeKeeeEeeeeew0eeee6eeeei4M7ee8:QOtc6lELaC3rz/SqOcEUOFRAgn2ghSJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 3164 msedge.exe 3164 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 1516 identity_helper.exe 1516 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4864 3164 msedge.exe 81 PID 3164 wrote to memory of 4864 3164 msedge.exe 81 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 3440 3164 msedge.exe 83 PID 3164 wrote to memory of 1600 3164 msedge.exe 84 PID 3164 wrote to memory of 1600 3164 msedge.exe 84 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85 PID 3164 wrote to memory of 2420 3164 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a17bdfc321af794c67601564e5a6ff99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8983c46f8,0x7ff8983c4708,0x7ff8983c47182⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:82⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,17693553203088237739,1246602529905781302,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:3488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5a541232992a673461fc44bd8ac1f5466
SHA181c3a9e39959a7503489c81fd6d5b12052c9c92e
SHA25627dc5c21fbb42e15fd4d8a785dfa8ed0478332596a6a1cd7d4bbb85b947aa358
SHA512f30a5b968ed67c94849212113348da90e29a7d1fd9be6dc7814e541b3e6c092c6d4ec123cc02fd0deb21e4cf6f4c46624d482f6a5fb599fcfe1ff3d7a0bbb0b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD56828b044d6a909196ee82d31e0676aa9
SHA11836116a7a8fdd6dd6b4379a0733a5d9e6a19b46
SHA256ee509e34c4838d8e03f1335f6ac923a9493e387878e4515ded17857250a68579
SHA512f63114880464a481e5d8c8c82e399c27b0bf71dc73c5a1d55e09ff6dcd600184447c3a6a2d8cba6fcfa8876ce20cd0c4d6ffeee7411773e09ea7836a5350d973
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5a97dc63d4cef6c38f08c45be0f9e90e2
SHA153b70a4a6b5187bb0143d3eb36738194490bd25d
SHA256b8b705600e1861b4bfe946fab04fc3a68d2768fd1e5656386d01ddc6818374ad
SHA5123b6b5f4d28be4adf9b602c6d1156e029f8982f7a37d114bb40405c1299b2d735de9af5930f96d4d667087f3b2c24cea0bf46b636f12d3520bf240bc1593cab63
-
Filesize
6KB
MD5c19cf994c5f1c4befcc154a0bb0c961b
SHA1c652469b6e5d14821db39b14760cdd4f21d1511e
SHA256fa96e1cd1f21c631c82038dd55ab9105ea8c3a30d236ee31d6f9c0689dbebec8
SHA51232fcaf8b72b5a21fb285bd2463acc87eb99bd6bcb2ccc9532de5e2b8c392283a33ac3157a347c97c6037504dd482445a99d2d9bc73f85359e0f709fa654b592c
-
Filesize
6KB
MD50a5f5a0e2c25d77a2c9930de711846f9
SHA17d53d1f7416d7c2a967e52b4c3f0fc432df38b99
SHA256b4307852f83895e81f1a1692af85a6a2bc41a96b8bc927e23d09bf8582201d3d
SHA512552e4be8f8a95a90055a041fcbeff06cf6d2582f4898f5f62b7843d60653a8c55bf3cee1e0b39d96196b69009a0254b958ac6c7daa172eabb78c31de74c155e9
-
Filesize
7KB
MD5b3d7e61f1f42bd18e4cb09239be3c77b
SHA1e6295b691948c13c4f79e296a91794437e50af56
SHA256cfc74cd41f831db3496477c89d5a11a138d49e6adc6d6338c02a846f73af7c5f
SHA512e7a45984260ad9a6812fd380cc9e5c0450d185d7fc435a2b5a40523edb4fb9918741901eb53bfa266e49085b14c0dab7596da5e9e6298392e078004debcc7421
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5e5cd72e81043a50a5b57b6f6d314da98
SHA13419a48be3f451952900f1ace30f5a60641ea51f
SHA2566fd1768822cde5c54b8e2a9468502b4f19774f0579eabcbfd9026ceedd86a5c5
SHA512098702e577953f6ef2ed24e91432d650ffe08a4ee0e7101f3c972415480ffec4b3ee48afa4c8975341d167009a3f706a7a9a5a9d77ba9a59859532edf95959cf