Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html
-
Size
32KB
-
MD5
2aa662d52e690c6c86f9b49a5f1da895
-
SHA1
bf259b465002aaf3b51d8e00afcfda8b01299367
-
SHA256
99f57846cd919c6b7e746f709148a610d4ca25ef2b447231de21e2e2e8773c96
-
SHA512
00b48c70a8b309c81803fff8c39f2ee57c4f932f22325d96d45e80565f610701adacd21b395b962f8d2a2cc2f6f2b3893c339985ed044f962ff5d7ac05f830be
-
SSDEEP
768:Zcd9QZBC7mOdMc1pC5I9nC4ub1wtwswKMISPd:gQZBCCOdF0IxCnb1wtwswlISPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 3508 msedge.exe 3508 msedge.exe 2208 identity_helper.exe 2208 identity_helper.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4472 3508 msedge.exe 82 PID 3508 wrote to memory of 4472 3508 msedge.exe 82 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 4304 3508 msedge.exe 84 PID 3508 wrote to memory of 1408 3508 msedge.exe 85 PID 3508 wrote to memory of 1408 3508 msedge.exe 85 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86 PID 3508 wrote to memory of 3032 3508 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2aa662d52e690c6c86f9b49a5f1da895_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff293946f8,0x7fff29394708,0x7fff293947182⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7428883620944328075,14617635453850637336,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD57c676334994dca1c9c5f16fe57070161
SHA103aa76b28ff0ecd8628c989b39c46450de1f7c1e
SHA2560d8827f721445462c65fa9d8c28bdb785b4621bfb84114023343a27038b7972d
SHA512552b6e0cd0f9f67d9cef545279fb08140045e428652d2b4b6ca1c72176f05ec9874c6b9932dd118b8110d22ab078d45c81f78b4edb3e077ad4039b27bdc7b007
-
Filesize
1KB
MD50d5b59aba45610a605a7c8c8294e1a43
SHA1f12e129cb6ce4bb013bc2d2e9f6384f8ccd0520e
SHA256d4b9e15fdbe79c526e679c69415945fb9e227fe7ffe6f0dc48d4c00bea5cc8de
SHA5120f86e2010b786475f8b8519f7f2d26fa490fd8a79d5d2226d023c1af62ec985bab6e049f75139e432f3d8f943f0ff8b245fe71f54cb0b0d56e5ae18c4ca6ef9e
-
Filesize
6KB
MD58467d60d660ecc5217097ffefaedcb4e
SHA10b17986e6114129ee256aaaab99b5479fc56bcd9
SHA256c3914640fe59fd9351c7dbaf27f8e1555915831e4dd24fb6fc4fa071f84d5ddc
SHA512194cca91817cac311e6e7c1c3ee9cd1c02ab2b0f0dfbec13ad08ca802e1e0f6282766f2c4f32941596f5b6f1e1bb8f7d5e72695b6a0f93b99b39c03bb52c1093
-
Filesize
6KB
MD557d3cce81118ea9d1ab44aa79bd0bc19
SHA10262a2b0ab605fbf80546189f0487c95939f17e4
SHA256b7724a30debc3a5ab9f590de3b40afdf8a196de12cfc312a145edcc0bcd6a6b9
SHA51277d8e76694e82f462b1cb54d0d94f1cbbfc59ebaebf97b062d937a6a22c98ce616dfd64144e80106e0497763b27f758dad473e0e49d27e335bda2d45340f0ee5
-
Filesize
704B
MD5ae33178c950f4e25e7c432be8384aff4
SHA18344b5495c40143ddc8f232cddc918b5bc78f276
SHA2560878da81d8e4c8937fb667aa6d4a330e93444925de39ef5b3051e12545ee6c3f
SHA512822bf97e3cb817ec72660f116cfa9c1ead2ff047fed5c59a48b6de8a1e79fd378f60dd1e1969b60efebeb3c7f5e8ebaa425b80d5f5c00dc3445ce6edf1e4fcca
-
Filesize
370B
MD51e30ab1f025c4ef85ae45db35de5005c
SHA1a25cd6d2b6ae8f497c74ec90a0d2e148fd094ff2
SHA2568d3c5dfaad4885e2c45df6eac55b2cdfb28eac6aaab8f659d16212ad7f93ee24
SHA512e318d564a163d439b77bc5399bd7d7cf0c6d0b16080c15fe80afd9f52dd3154e252459c663badf1ba91a43952c1bdde3a6e5ba74a16ba2b1c73ce319fb0fdd2e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d175481cb6752c06b0cf62eff2bd6a3e
SHA1af3ad8018ceecbf967732ad976f6fcf99ff80021
SHA25694aae3cbe17805a15591fc49359cd24bf7d622efebaf9e100ebbfb706a6b571b
SHA51296821ce340b80e82a5c8b290cefe9733136fe0d5d3babffe55737466b288edd1fa5f2b836d58d15c0514be1c706f0995fb0d2e5ab75d24da832e91154858363a