Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 08:51 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html
-
Size
140KB
-
MD5
4100e61ea25c8a9941fb582ff1cc1533
-
SHA1
856468f7b555f1f87fa1882eec92c8451e6828f8
-
SHA256
c251ec4a64321c8dac417f76dd0476f3427171a99803d49323fd3e446592d391
-
SHA512
b748dcf1023c9aecd53cfb3071aedb6676171ac49c3ba54d49c243e50c8dedb945d40aed0bd0e8807231210ef753d98a2514b51c7cbf38ffb334b364672a396e
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc/riHA8cGLuyE+cZNMMK0p:s5xXLTg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 4264 msedge.exe 4264 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2096 4264 msedge.exe 83 PID 4264 wrote to memory of 2096 4264 msedge.exe 83 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 828 4264 msedge.exe 84 PID 4264 wrote to memory of 3232 4264 msedge.exe 85 PID 4264 wrote to memory of 3232 4264 msedge.exe 85 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86 PID 4264 wrote to memory of 2952 4264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4100e61ea25c8a9941fb582ff1cc1533_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2bd446f8,0x7ffc2bd44708,0x7ffc2bd447182⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5531779624397178446,13662191664714002284,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5531779624397178446,13662191664714002284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5531779624397178446,13662191664714002284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5531779624397178446,13662191664714002284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5531779624397178446,13662191664714002284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5531779624397178446,13662191664714002284,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A13.107.21.237dual-a-0034.a-msedge.netIN A204.79.197.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1E422F0EEC9E668B28823BB5EDB9678D; domain=.bing.com; expires=Thu, 07-Aug-2025 08:51:59 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: E56A309C930B49559E884514C11B8063 Ref B: LON04EDGE0614 Ref C: 2024-07-13T08:51:59Z
date: Sat, 13 Jul 2024 08:51:58 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1E422F0EEC9E668B28823BB5EDB9678D
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=-sNl1oYg8DLrC4ju33Vp6jFJXpjUWmdmkkcJz68Ws6g; domain=.bing.com; expires=Thu, 07-Aug-2025 08:51:59 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: C68520C1ED6B43A0B1F1EFA5E93BC05B Ref B: LON04EDGE0614 Ref C: 2024-07-13T08:51:59Z
date: Sat, 13 Jul 2024 08:51:58 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1E422F0EEC9E668B28823BB5EDB9678D; MSPTC=-sNl1oYg8DLrC4ju33Vp6jFJXpjUWmdmkkcJz68Ws6g
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: A12D78BE05A2468BAC6FBAA26DDCD346 Ref B: LON04EDGE0614 Ref C: 2024-07-13T08:51:59Z
date: Sat, 13 Jul 2024 08:51:58 GMT
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request99.58.20.217.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
13.107.21.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=tls, http22.0kB 9.3kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=2b41e41c531246fdb49f2abc27fddca7&localId=w:B52E0A56-585D-D389-649B-CAF68352C2EB&deviceId=6966568319188347&anid=HTTP Response
204
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
13.107.21.237204.79.197.237
-
71 B 157 B 1 1
DNS Request
74.32.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
237.21.107.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
378 B 6
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
71 B 131 B 1 1
DNS Request
99.58.20.217.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD5ffe3ea187a17c83425c7a58b63c1c967
SHA19bdfee91d563a146d4b990869bb1b08aa2f66880
SHA256780dbaf071416ff1cc29291ae4beeb62ef2c9b91d350291bc629a293c2d81f60
SHA512b33a3567c951eb5c386924182d973c8ffdc16d21a4d14caf17f51b67be5d87adb716fe7bca586ab3b55452f9723640f5602b3258feabfe47e6abe5d3cb529170
-
Filesize
6KB
MD55fbe36cd771b853138a055dcb9de8537
SHA1e7787878c79bbf5f585e5b59afcacc6bd4f79d83
SHA256d28434ed33479d48704e68c48fdb1051216630675d12f63262aa88451114870d
SHA512d0f1816541aa7a77e368010ddda28887999f08ee6d6062eda9560be324232d510996df05fe7d401f738e89983bd548545c1bf7eafcebd1797d151e2a9e856046
-
Filesize
11KB
MD5ab8cf95dd95748d34289656ba16bad0c
SHA196c29a9227e37b72024d3999f8e919eff86e9615
SHA25617eb341630cde898afd9502ae0a0a078d2f443291d0303d386b449c1bceddb93
SHA512976f5ba9155742d3e54540cf982370fe5b871196cd1b2d16bede2f5a881bd9dfec61a047ee91a30eb58770dd7755a2d9816a1f608a0510e6eaec793273079641