Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
ba576c9c0fadd3086b32a5856bcfbe61_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ba576c9c0fadd3086b32a5856bcfbe61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba576c9c0fadd3086b32a5856bcfbe61_JaffaCakes118.html
-
Size
74KB
-
MD5
ba576c9c0fadd3086b32a5856bcfbe61
-
SHA1
e990671891c764705d5473b6bdfb1c5574db29b5
-
SHA256
6cac77781d34b315419a104864db2080661bb5b22c1015411ce765792813ee27
-
SHA512
8afa64062b06d222ff033f161bb4e6e7ce2498c3e7d14a0add90b12f79d7a5ac416c1cea26272f7f186cba6932b1d502fa29017459708d1a5270bb93c22c22cc
-
SSDEEP
1536:YLNCGEx04G3E63rqrypaIX69YYb3kwKTlqAbJeJ0:YLNWKN3rqmXCYYb3kwIbJeJ0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3904 msedge.exe 3904 msedge.exe 3320 identity_helper.exe 3320 identity_helper.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 512 3904 msedge.exe 84 PID 3904 wrote to memory of 512 3904 msedge.exe 84 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3940 3904 msedge.exe 85 PID 3904 wrote to memory of 3532 3904 msedge.exe 86 PID 3904 wrote to memory of 3532 3904 msedge.exe 86 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87 PID 3904 wrote to memory of 3564 3904 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ba576c9c0fadd3086b32a5856bcfbe61_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc457746f8,0x7ffc45774708,0x7ffc457747182⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,16646222002915457122,3111087740837695568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5c0dd703bdaa584883da94dcf1aa825c6
SHA15f6e6c8cdb864e7f46fe82a1cf58956511cf7ddc
SHA2561141e3eefb0e448c3b50ebadcc189c1a033ecef4076d5934857d7932f9bb3588
SHA512efbf469dfe0b67852a7efa5bb5895ae2f125561066a2b276be60834fc7bdf9b18b371fbc30b43e9daa721d91f06817342ffb950c0c579b31cb460e40e0252c45
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5d27c595f6b9a8cd9b35234a46e8ff553
SHA1b015c4941f4ed7dd0dc71e73e8ad1e21666467c2
SHA256d9de412d018a873fedb2505386fdba0592af7561a1fc2973d12b70280e964a61
SHA5122011178ae5436ce876d10ecef58421759d66173d0a284c0bceab9d2a51feacc4ae36270a5bd22254fc82fbf11cd4416fd999f5af6091c815a51d5108480a8655
-
Filesize
1KB
MD5ce079697acafaf54bf60c6f9878373da
SHA1858d82892910ebf7c2ed4f402bc85c6a3b9b36d2
SHA256aa4afe1c212f88a4bb150ddae64b1dda1f2bc92268519ef9536ffc8ffbd33f75
SHA512c8d127edece0baeeb3496a28189c50d6f5ed0c562a9f65a2e9abb7e563010a7c15d8bd15f48cd612ab0edce5bfc3b3647dc4ecabfaaf6e7b525c8a2650b85d6c
-
Filesize
5KB
MD50c74776b026d921e4f3fb72816cf3141
SHA1048d1f0e3ef58b0310b92e99b11bb98bc0ca7edc
SHA25665a002eccb29fe19ceb4feeddc5f94a4b021e4a0fb4a24e2ebd4b97d0acb8c4f
SHA512e4f2ea89e143ec6bb8b2ae60a82f702503c53c342fb571d7cebd800b05f3c18791ddd00c8b6c7f36efe6b693462973a333d1bed7a33f83dde270df2ca6d0ae1d
-
Filesize
7KB
MD55834e7969bc0c28c2fc729ea2f762510
SHA1435c32b473dc07cf7f36e1a746499f44806618aa
SHA256de2f10a9381a4d41f896f8c7e854df7de87fe7b9bca4ae346c4a535992b75f6e
SHA512973b3da0f80893218287faa42118d24a7b77607ea9e67a79105041230ac2314242da948d53f8c1ced25c9f3c67699ef069d5cf1b9489f1196a67bc23921977c3
-
Filesize
7KB
MD5a2ae62057c44627315e98debd7758259
SHA101d2350b2cef93fb16836d2869144df4a78339d6
SHA256f43ce16194e8a3ccbb6e566d6258910b517718ff9d68e375de145ca3fde7fc17
SHA512df0e01c0bbdaaabebe59fa60a7a1503e8d1dcf206ef4eaa0fb76f186af6ee8ea734176bf197a949f40363874590d88ffe9c1720ee7796a63f05aaeeec77ad434
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cb39209199bd705013874690aaa2da17
SHA14e356c0af2019ffb68ead96c2e5514efcd020d5c
SHA25635f5ac39bc371cadcc4fb637d98ef14c8c00bb639e25b939104e5aa418126f84
SHA512599bb140d06802c450393737702020b41583b75bb37120191114befe868c15b8a9c8da0b1b252d3af3ab1ab2667016f937e30e669799ccb40a4d36b4755eba15