Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
4072a06759d7cd6972542d0192d1976a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4072a06759d7cd6972542d0192d1976a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4072a06759d7cd6972542d0192d1976a_JaffaCakes118.html
-
Size
131KB
-
MD5
4072a06759d7cd6972542d0192d1976a
-
SHA1
78cf30c985de227e04fa25982abc804320d4eeaa
-
SHA256
251c69cc75d5c67f12bfbbd51334d2c5370fe5e506d9236bb5e3a4b1b309081b
-
SHA512
296569b324ea332d4bdba0e0462739d74b2cd7839897b5ce72ea7a36f90d755ac34c3039d65273efa2b7ea42a7ee72ecbbcfe71ab66228ffe6016a3e4d1595e5
-
SSDEEP
3072:Qw7jLeCU5EoH2B+H3N+OAMbs+d6YXnT+DpNhSc:Qw7jLeCU5EoH7d+p
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2628 msedge.exe 2628 msedge.exe 448 identity_helper.exe 448 identity_helper.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe 3504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe 2628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4512 2628 msedge.exe 83 PID 2628 wrote to memory of 4512 2628 msedge.exe 83 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 3516 2628 msedge.exe 84 PID 2628 wrote to memory of 2868 2628 msedge.exe 85 PID 2628 wrote to memory of 2868 2628 msedge.exe 85 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86 PID 2628 wrote to memory of 4680 2628 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4072a06759d7cd6972542d0192d1976a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a68146f8,0x7ff8a6814708,0x7ff8a68147182⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6600 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,1781334797769862784,8814848529869470175,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5ab8437b84810bb40ec89807a861a9da4
SHA14cb6354c1cac1b0130f565b4415171db956a767f
SHA2560def0ed66395e17148924e6cac9be088b1bbdcb19e1aec0d1c4ceecd9e9120d3
SHA512822722a17fe019d856f50952a38c044c056399f9506dd66f9120fb74244536ea88f3ffb81d3e01690ca1a0f9e22cef668fb9f40252bd19e3d783b29d55543634
-
Filesize
1KB
MD5647f0a7cc5c3d0f12fa4d01884509bc1
SHA10136fe2e19ba5a0b1c8984d6a666495354b9d916
SHA256775cf3dcda7d1d7fd88c092ff7aec8500e3f62bb5f56dc3c7f851fcdd8584143
SHA512dd22b5a3aacbbcfc41935e657d3cb13a9a1980b9194a64b006c54eb5112e21097ee23e24fdae6f884c2d5b46e008530991cb4748c7d65acba346d00dc52cc018
-
Filesize
1KB
MD5f623c6e02f96764a70cfd84f72baac15
SHA1cbd55beb6a5329e3d17329f37cd0fa239cb9769d
SHA2566339f99689a2187932f78062e77e46d027f59a18df6555d6a2c3d9d4cfca2b53
SHA512e30c281adc22d763a53b8506bcf7434caa1284ec03bb3c9b6211fbd6f2532b8bf751fdf8716cab6d63b3b83eb16885fe1ae4f42664b3c592dab0a8dda4736d9d
-
Filesize
6KB
MD57e24c83c8701637ece05b208ca414640
SHA18ee20c9ab765cc8918c8ee069a76372f2b23410f
SHA2561697846d3c8be25f3e0438925278da7b0082fee1c30d1f3be1a72ea8ee274e83
SHA512051e9c6d8acad7eba20ec3ba4b0b603eda3aa5a5057210b6d62fddf063a892350bb16df6c79a0a592e28adb8832ecae136ebb609b1303d061c872632400d2725
-
Filesize
7KB
MD560a3c095f9100e524b8ff6bb13f36f83
SHA1d2d2c3a6e694a759d020b920bc42da6ae1c6b14e
SHA256b634917cde7be6b9c2c03489b2a53712127c2b99600700227c4436584e78f07c
SHA512d98bbb7a64abae29d112430626e7bedb437dfd1fd6ec17da67080784acfbab6fdc42839ec70b2e1f7d0c455d681d7c96b25d104173cb51c965b539d41a6bffd6
-
Filesize
7KB
MD5c18306a80f44cb14f18ba52eb020411f
SHA1e484286fe18349490224572c85c2dd60cf79a1b8
SHA256ef11e4e731008067880f22ebf67b5cfa4c223aad5f856af055aa55352578c889
SHA512742656602bc7182cd962132fc98dd85c63de8d12e903fe5901e3a45f05adcfa0bb4ff6eac228e6eb78188550a1528f1a1f1358b265bd41c335313c2acad9d7b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de3cef379187663348cad8c1057b6e56
SHA12d6e489f14a428762c9477023fe60da41464d16c
SHA256c5121099d6f2ffc2499d3f7455c45059531ed4357ead4e7c80f2187053f68b20
SHA512c0fbd3f3fb2b17ff97f53d872b4acfe0bc5c77acaac1e41ce9e65f237f6bb9605312a6fbc40e1c1fbfd1e8919b92055e4a8e2e9ffd14de5478942fbaf45be9ad