Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 23:03
Static task
static1
Behavioral task
behavioral1
Sample
a04954d96e83b035ec1e781f39342429_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a04954d96e83b035ec1e781f39342429_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a04954d96e83b035ec1e781f39342429_JaffaCakes118.html
-
Size
79KB
-
MD5
a04954d96e83b035ec1e781f39342429
-
SHA1
85429b4ee075f3eb7b1017e3620f81b900eff4aa
-
SHA256
c1041e8294c502bc812d047f2d718d0615d43b4b04b8a18f10a0341e3be9b6b9
-
SHA512
4281be396da9cb8b54f11d8c0ecf83c67f78ed52e047c4ba5640f502a90aec5cb699fbf0e916bff4bcc2d70b1f73fd920702e43deff73d1baa40bc6f7b775a38
-
SSDEEP
768:Z7A2SnSLFYS9qK3KFM2Hlb8xFXV5yJHd0vRMLOdjcT4LyRHH6y:Z7xqK3b2Fb8x8JAMKLyx6y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 1064 msedge.exe 1064 msedge.exe 3520 identity_helper.exe 3520 identity_helper.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1400 1064 msedge.exe 84 PID 1064 wrote to memory of 1400 1064 msedge.exe 84 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 4352 1064 msedge.exe 85 PID 1064 wrote to memory of 3512 1064 msedge.exe 86 PID 1064 wrote to memory of 3512 1064 msedge.exe 86 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87 PID 1064 wrote to memory of 4684 1064 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a04954d96e83b035ec1e781f39342429_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff849ee46f8,0x7ff849ee4708,0x7ff849ee47182⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2188 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1652 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1652 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5906660689191516259,2256480903432953724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD586db0145383a1d0a2590ab55c81f84a3
SHA168ea5fbf8cbed6fb1d7f7a5376a3a20f4fe59dde
SHA2568da6fafa71781a11b62cea04c426ebcdbac30472c2535f23ec96c18ec016e314
SHA5123e90ebcdf08f1984a144a2834cbaeb6dfcaaa10aa63c9f36c8fd14799165872e312537b5c9ff13f67f9ec8370fd91b34d05342c8a21e8577017a279da11a6ca5
-
Filesize
1KB
MD50158b14fdbaea324b75ad7b62c9bd8ce
SHA12ac21906262500851b2863db2691e0c8e51527c2
SHA256dd185940367c868cb83ce887aaffee355fb19e4ad6a5e06a2158a1c7d86b41d2
SHA512ce1a78abc363364677d37f75320f44a2310fe4b3d128afdc57d5a7b50a7489162098660fd022ae153314f5ce1a8eee7342b4c6246acf1ae49d288906ab9c89bd
-
Filesize
1KB
MD573b13899b09750dc3c21fcdb3aa41099
SHA160932fa506936c75bd705845a95be542a690357b
SHA2567cf8339392d953e1aeccfca05c122a61caad72742e3ed97ac0aee5b2dcfe328a
SHA51271cd5624d60a5a6ade8febfbc67a1b343399c28ca5b50a551aa40e28e5219423b09160fae32641ac76528937fdef1fad57e513dabdcd2aa1c7ea66d89ed02d5a
-
Filesize
5KB
MD542461fa01cc1b8965441f72e133d60bc
SHA13c671d47a14a08b739217a99fb22eb4b463a5409
SHA2566a1f9fe343126f14eeed15f0bf8b56f39b56a78319d1945d22bfd686d19d5278
SHA512f8fca6a1623d9f8171dfaa3be98a64a9b6a08e8b0e8137c80dfa7d01ad17adbd75ef69cfd220aeff428130a208ede3ab472c2429cf07efef6ffe03e3460e971b
-
Filesize
7KB
MD5141770b81924096cf5b76682de230113
SHA163d194c2f5a38422c57c845f2f370b37cd2dd9fa
SHA2565f47d8df1db01958570de59ec3bf2a96e9efe90b26066b8d545c571eff92c948
SHA512bac2b005cd180834420dbabd6e38428b129a1ddda3f583bf9905f0a38f7a016012e5a225df610bad9b4006a7333e2cc1f0b7f3d969958c62e8ac86e590b8ec9b
-
Filesize
7KB
MD5399f0ba5a1afc4d089d2c1b4ab4ceeb7
SHA12987c756251e2bd1c85bd5396a499a67262da126
SHA2569a5212b685f0f2d6854c6de56a84e9bae4a898003b7be51c64c0b6d8d3f8f889
SHA512c05aac77731279f869afa38aa4c94b323e0dff871edbdb0ae0530339aea6c1e4c0ba239070a975f1440ceea90a06dbedd5cbec2c6ad14f5e5f3177ab5d85cc45
-
Filesize
6KB
MD5daac05d19b0501adcf746840e03d1ae8
SHA1ebad5923676936e7bfa7d313a538b4f66d2f3e7d
SHA256c6d7c78d561104b28e659be334f67539624ead1c965c4d20fbaf05ee22590aa2
SHA512bf24b897ae013accb14a452e5ec2f0f85bb69b4155f8b1c09c0463fba6bde2a90c66acb8c64defa5d24f6d2594aad181811fd6d84d23e31110c92d2e1216d18e
-
Filesize
370B
MD5fc69053058692c1dba8dc70095abde65
SHA1f0ae8a524a2d94819421042ad44a9c4c2082273b
SHA256b192927fc9e809300f6943e7d8347a32bdd679fc80cc61c7e8cf4bff3f329e0e
SHA5125e774c182fb2d366c572de55e86e5b656e3b6e25dee51474d887ad920c4bbc57340b40d654bdb5e7ed1cb74e0f3425098f59343ac215f945fe5281ca02cc505a
-
Filesize
203B
MD5f4c9ba284c8647158053cc87a3b4e9e1
SHA1ce3ea0b08e253ad204298e1db2f6d19937574682
SHA2563b2348add7ba19a2aa0b62b8dad551db004f306ae4e981f9e1f01b1fbbfa4f05
SHA51292338f3ca69f81552bf2122c816aa1e5667f03e480d685a2cd92cda44ebd303fe92740d883e27018062f72aed3a2e511c63f4d02ce8fe35978e51cafbab60556
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58e848d591c80ff92122f31d15990ed27
SHA1348146153f7d8b13388bd0c186b126bb450de3bc
SHA2565b3b9f778de99a95f7abe3f108ed06c5d606e745c2eca51bc486139c589ffad1
SHA51200a8d8198f601d1fde40b34b53be377176381fd65c16ccc817b9c0370854a8b2d3293422f1012df2049c93ceab53b1b053507e9049985ab03cc1d8308022373b