Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
ae32a9e472cdc2db714608e849f5857b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ae32a9e472cdc2db714608e849f5857b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ae32a9e472cdc2db714608e849f5857b_JaffaCakes118.html
-
Size
118KB
-
MD5
ae32a9e472cdc2db714608e849f5857b
-
SHA1
9bc84b3975fa55c975cbbd285fae77ee21431af1
-
SHA256
3606349e5e55331e6722597c1b0b7291bd34b90f42d4c1c34fe8bf8533da3ba7
-
SHA512
fa5d94ec0ce2844e146ba36d8973a9e1dd85d94d441827eb02677161abcc5c827d6e918ba59ef11d7a732f05ba86f88402e2d256c0b91b5718de09297f2e0231
-
SSDEEP
1536:tuimMrb122uOQjUQyOQ5SrObVTFOQ2quBEWOQsKuOb1iiOdOQlMq4OQfsPObbBVz:tfmMrbY9fiaNIbvclq3EmKb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 3528 msedge.exe 3528 msedge.exe 4808 identity_helper.exe 4808 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3528 wrote to memory of 736 3528 msedge.exe 82 PID 3528 wrote to memory of 736 3528 msedge.exe 82 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 3264 3528 msedge.exe 83 PID 3528 wrote to memory of 4984 3528 msedge.exe 84 PID 3528 wrote to memory of 4984 3528 msedge.exe 84 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85 PID 3528 wrote to memory of 4136 3528 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae32a9e472cdc2db714608e849f5857b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd15c846f8,0x7ffd15c84708,0x7ffd15c847182⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,1382981599323209445,6560916861172747144,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
203KB
MD599916ce0720ed460e59d3fbd24d55be2
SHA1d6bb9106eb65e3b84bfe03d872c931fb27f5a3db
SHA25607118bf4bbc3ba87d75cbc11ddf427219a14d518436d7f3886d75301f897edaf
SHA5128d3d52e57806d1850b57bffee12c1a8d9e1a1edcf871b2395df5c889991a183a8d652a0636d5452068f5ef78d37e08ce10b2b2f4e05c3e3c0f2f2230310418a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5e4d3e8a02294f22e46bd4ac3871cd1cf
SHA14b599078ea1807287af796ac69ab8e9412828821
SHA25684f7a6104cca4563dd8f1539e4cd9d4ed28dff52e85026d91320d6bfded0030c
SHA512692cfa4e648349d6d3149a59e6c93b4a433024735354b474f4c845fb57c3840020d79c948f41698308df8a24f0c9f21e34b8cf351b741acad23c9e8a075ec8e0
-
Filesize
3KB
MD57aae02b09283ea2fac9c513a66121e16
SHA1666a198cc187f910d70fe4fd4f577429f2adf5a8
SHA25659941666ab5f6b49bc19c1bbf2c77784e6b13fd8101473507d2145616471c5b0
SHA512661f63fce16a7a39843d224c4e35b259bfeab34e4d4ac871d8e57a8097a87e4a4181e10c7c72d2e25dc4f72064ca89e09ac235f4e6f7d0c14b1df27049553a0e
-
Filesize
6KB
MD595ed97047b88efb869f906d19f1b21ef
SHA1f92c71ce7e1cba27b55af514ad7c6977c1be10ff
SHA25626538dd5201ce1cdde7bec8dac05b2dfff0ae2b11277dab671bda11ba740e48c
SHA512ec630a2789a4bcc4d90e4b7f5bcf06612f13bedaef586af214680fc36d4418784e3a7b8573082d17deac9991941cde317324a268d4eb5cd116cb1baa76edbcc8
-
Filesize
6KB
MD5c056ed9711831173fa84f93c9e36e088
SHA1f47c01553386490c34a18ffc012ec59cd0c30165
SHA256a0675c36f8352cc3924630f043e7b554345fd4a01d9ad341962706fa2faafeb3
SHA512614c66e2ca203fd9024925fc4f1579694db55305181d342e891d670fdeb90cc9a6155d9bb6bea347cf0e93362d101a04e329c99dc55bcae99c86d1e2f257ab0a
-
Filesize
7KB
MD593e0a9c71d13cd2da8d44ec08272e6b6
SHA19bcf1a262ff8045b981e27d0521ec39a14f096dc
SHA2562078178edcb70ae305c7eb61cc78b40eb92c076317f3bd58eb62770596ce2faf
SHA51242beb4a459cad22e239574c754d8589738e8b12f14181be40188147ae6b93e73656c341066d1b214401758f5de2c16b8fc349878c80d271683870dfb2fbf1b53
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5767e19171cf09d4a1c8be470d5423040
SHA165acd5df32f444800f88b4ff91d0d19c0e5801d7
SHA256dacb852fc36c266feff5e335eb441003b3dd4b5459f094fe8998a4add56ffcd7
SHA512f829900c6e4d0931daafcae20ea59a46fca738163f92d1c04c8cababfcf1461c1ae4bfcd72886a821622e2f0af3c4d4f8cec023460e0f0be853912f52dc0a2c8