Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
ab6d3adff1c0b6d5024818e58faa9608_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab6d3adff1c0b6d5024818e58faa9608_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab6d3adff1c0b6d5024818e58faa9608_JaffaCakes118.html
-
Size
57KB
-
MD5
ab6d3adff1c0b6d5024818e58faa9608
-
SHA1
a2c867be634b1c4a8677df4f5183b4722a07952d
-
SHA256
4881e87c91826d5840771dc60542f8f067ca1d8e364d6e293fed47630744c969
-
SHA512
b3cb25e28d12218a14ae6c23b53c233acd7e4dae87bf21fb9d709ea78747c16570b43a189a08991cf28f4cad5775104106d789f45cd088323109740ff7c4e868
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrol1wpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrol1wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 3688 msedge.exe 3688 msedge.exe 3028 identity_helper.exe 3028 identity_helper.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe 1412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe 3688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3856 3688 msedge.exe 84 PID 3688 wrote to memory of 3856 3688 msedge.exe 84 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 944 3688 msedge.exe 85 PID 3688 wrote to memory of 4080 3688 msedge.exe 86 PID 3688 wrote to memory of 4080 3688 msedge.exe 86 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87 PID 3688 wrote to memory of 1216 3688 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab6d3adff1c0b6d5024818e58faa9608_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4b2446f8,0x7ffa4b244708,0x7ffa4b2447182⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7580030458976983143,6340599388269754395,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5ceda365d39b53c4eab171064692f3f86
SHA19b9b069d57d1667ac5eac0428cdcff1e964b96fd
SHA25685b24054f0d439d4752ef0e5f397c251545612ddc069421487a8e2c7620602e0
SHA512c13602015dfc941a4cfb48adf5ef199a655686abf28ef8e09f23ee98828c0f0a82146f8023ab49f85cf8732e512e1cfed5bb8d000af55e5b1ce5bfcb66e0b6ea
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD53c986b6215f89723afea7c534c945750
SHA1bc767579408926173cda88b05144ce47888c2cdb
SHA256f6e449af7e0d59c101fef8d36b985bd4607d46d9013f29090a6114056cc08565
SHA512bd641c7017c165bcfa4b865f954e4f8b11715c4eb40e83a2e4ddcb6a5f8248796f1b22c5f3ba269c10349301c11ce9961a470285c6329574f877450f2915997c
-
Filesize
2KB
MD5a637fffe31d7a121e135146b0a1a3bee
SHA1ba8bcd4e95fd0098940bdbb28ea674275afdd4ac
SHA25648a2ddff20757810bff0bf76d56c5b514f99e804ee8d54c2562fb74b58c91d23
SHA5128a054b2da7ebd0241b845c7b6996b99965db3b18213ed4472b2efa36bd12b1201175000dec1c5f35499bd401c7a1c11317b4defa86644bd4860543431c5e7d8b
-
Filesize
5KB
MD5f00aff0863717afd99a9e3399a38ba49
SHA1c40bcc43f78f85eff7dc49b50e382f5b787d6e1f
SHA256b06ef93496ec225cbfc350a49a4d555ca510d779d9bbe5c89494f1e5558aa433
SHA512daf457941ea12f77cf3d7f3ec75eed411f53cdc2b4135854cdfe80b18e10ad1ea6cab460f36d2ace114f6c17f4ec0685d944c23398f3018a97979bba8ca2eabf
-
Filesize
7KB
MD588c7d56ebaefc465a518bc30cab2b628
SHA11ff4c2a8c35884d999c70f4c3ebfb780baeaf788
SHA2561ec3e0d5eb77cad7bfdea82c4915ea6881b425a991c1250a8af470899307a911
SHA5123a4eb913827e58c8c1da2a39603ecf159fd4bc9d0716df0b93eaf521a0d3ca868e1191c89c83abb8314902f1994dfa47b0feb730cae048839a0e57ae8358b89e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a9bad38adc655898b900a240ce5e3126
SHA1c10ad6eb6013c518f6c4e517c6c350b676836b4c
SHA2564b8270ad785e53514c732cf18802e099be580299e13aeec2124fc43808a3e5b8
SHA51295066cea434e97e57c93c30faf8329887226069120efe64e9c15728447bd899a6a657ae0124b0fd42ad7ba51fc2ca7e3fbea27732fbf784c24aa1c51ca25b0b6