Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
b1314b7a9b9ca5379f084428ea781ef8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1314b7a9b9ca5379f084428ea781ef8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b1314b7a9b9ca5379f084428ea781ef8_JaffaCakes118.html
-
Size
57KB
-
MD5
b1314b7a9b9ca5379f084428ea781ef8
-
SHA1
295f40cdabdd1d9def7e77e02da965af98d4ead3
-
SHA256
5a2fbcc204ce70dc2e33eba192c17573fce9fb0d1f4c6eeb8c9afbb309cfe244
-
SHA512
ec19ff14259d4ff69c82499d53a60dec14bc9fcd540e63de84c3a72725df246f64c7a869e24a32c6d301fc1eba9d94cf697cccc66d694420a736dc11908ee874
-
SSDEEP
1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVroRhwpDK2RVy:ijnOPHdsj2vgyHJutDK2RVroRhwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 3160 msedge.exe 3160 msedge.exe 2380 identity_helper.exe 2380 identity_helper.exe 5240 msedge.exe 5240 msedge.exe 5240 msedge.exe 5240 msedge.exe 5240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 2712 3160 msedge.exe 84 PID 3160 wrote to memory of 2712 3160 msedge.exe 84 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 4588 3160 msedge.exe 85 PID 3160 wrote to memory of 1116 3160 msedge.exe 86 PID 3160 wrote to memory of 1116 3160 msedge.exe 86 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87 PID 3160 wrote to memory of 3708 3160 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b1314b7a9b9ca5379f084428ea781ef8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9984b46f8,0x7ff9984b4708,0x7ff9984b47182⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:5364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3498125847963563594,3751201572063733529,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6556 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5f110834fcbab803b1865ec72ec4776b3
SHA1dc362ad436680d6ea88509a94bb4f341d773c8ee
SHA25620c4facc09cfa38f22cde082b0c0fb164ccb5e29fb2490794cf7742f49b10b26
SHA512e51bbf8985d88f502d437bd56d09e59a6870717b0cc7793185ec5aae8b1bac61380cfd9460525762c0e87700cff1ce95d8f6f6e235a7e37cbe42071572efe6f9
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD562ddf903e4cefa513d4800280a15b02b
SHA1c269973878630a0b2f91cc79ced21db36243b784
SHA25608b39f6db16f7ed85b888ec4cfaa58824c46a0510c91191746e12f6cc7213608
SHA5121ed1061dcba0fed5820e91e47652c12d8e0f9b6726ede34df1ad6b569909430e80335eb97ae156094293c90cd7a454ab2ec625e0b2a684ff5273b7462da019b2
-
Filesize
2KB
MD5bca4a04c32293c926ba1cc8d4ad41bb4
SHA12f9782c3562ec6de58d736ac37799e3f18fbdc01
SHA256db162b16c93a1ac1ccf347c562da2f7ea017a51775f8560785d09a55cbd12c1f
SHA512d0cab2d8ca5bacdd4f089c916b6722fc6c406b4c27825c03e5e0570d1fe04a3fa0cfc8a4174b9188f9f10ec558b51e32785106f1e63a1cdc519a72c89acb88a5
-
Filesize
5KB
MD5fcda40416a3b101a085f6d08d76bf284
SHA15f49c03e82014b45179ead76efbd4dc263c2010e
SHA256d632c00ee1ffcfee7c60c8ed69de4f19a50498fb38306c1519630f014129ae77
SHA51244c235384520f0a2440b83a30c5450e334b0d0a2ab880c5721181dfe64265b2c116ebc57c9d3819a4238a8e226e9260aa7d4bcb7e08ae44bfb21211a5f177751
-
Filesize
7KB
MD52c59a1ae66ecded1432f18b1481d3920
SHA1680ac8f78c6243158dc73381988b7528310c12c4
SHA2560dd11ec7a70654c31b84ac3e77e815c266e29f62edccdab50c9d616c24836e1a
SHA5126487f4a69d2684cb97d68ddd0f117fe8e4e6198cacc27f44f7f0b4f4416ee15be4c53c4da8995a9a18d46ba50d9ece07ac4c27b2cb0d878afea5b8c5d4e146bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD585b0d5880699cf531eabf6ba652c3e29
SHA150156fc0849c4de6b74c45e66fb299264ae1ad31
SHA25661680f7e61fdfdd816b2804fa02b90ad587c26ebd7344c322740b2aaf7ce7122
SHA512607635a745f9398451eded70960f19128c2dd90725892e98a9c88e56fddcd6e25755a1ea6e9302cc83f0bf83854086c750d65dee025d9b37ae1c4be1d820558b