Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
bff8ffaf10734ac1837ac9fba60fbf59_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bff8ffaf10734ac1837ac9fba60fbf59_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bff8ffaf10734ac1837ac9fba60fbf59_JaffaCakes118.html
-
Size
53KB
-
MD5
bff8ffaf10734ac1837ac9fba60fbf59
-
SHA1
3b92d1356a2cca7553502eaa2b10abb470872c52
-
SHA256
839b2a4f7a7782db04eaee4c770cd978efc276c8caa05ce26bae5e53608f5957
-
SHA512
3f4fec5014f475cabe214e0a55f6d0891bff9c4fe1d8a478a436c170a9cbb1954903b77c8ca7d4bd716470c2c30e53e6384e7f5e2baf956cf2785f512c7cb83c
-
SSDEEP
1536:OufGIpBbCERw2KARgOA6PEA9Cr2KA/tj+L:OufGIpBbCEy2KA1A6bI2KA/tj+L
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 3728 msedge.exe 3728 msedge.exe 4396 identity_helper.exe 4396 identity_helper.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4152 3728 msedge.exe 84 PID 3728 wrote to memory of 4152 3728 msedge.exe 84 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 880 3728 msedge.exe 85 PID 3728 wrote to memory of 5032 3728 msedge.exe 86 PID 3728 wrote to memory of 5032 3728 msedge.exe 86 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87 PID 3728 wrote to memory of 4500 3728 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bff8ffaf10734ac1837ac9fba60fbf59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed34f46f8,0x7ffed34f4708,0x7ffed34f47182⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8309543844034021200,7017697698048626871,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD54226d932ea04b2d98c2aeaf45f4b93f5
SHA13fd7e39e98de4ef8febc1e9774bbf11216a1d460
SHA2561c305ab2f5b9bc11597bf60f9bcc9cfe1ae239b8a5b4e11b102feb5e9f52d7fa
SHA5120b976f84626a160dcd4ac35b6d042ddfecc5dbc337decc4f37bd2a40a450dc62afe991ba0db46b5825450b15e017a5c4b2025237ab2dc16968ccfc76a18cfd72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD59630bed3654e6f3139166ff545ba3d7a
SHA1a09348320804a05fe03dbd5ba9137893694c50aa
SHA256396025269aaaf1014e757a76b7d229bbceffacb2eccf4e5ac557428cdb80e060
SHA51201dbdc0b0c4f9f9f2886702fd76735297528384c26b928e2d6afda5eaa8a9fde7b8689e74a978d36b850a0b692b101035a1bd88d5c30957a2adeef5974e0a543
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD51c53bd651e70935c757da1444ed367b6
SHA112eeb04b061f6c7feb36157a7b8b5cb064342a55
SHA256c0067ae6294b228a63bf8161723344bdddf2bfa698b2bdd8c4fed7a03e881741
SHA51240bd19c19c5685afe11001a87763607e6c7f01a98abdd0dfd515303209769196eb2fda6202a8121b88df950d8f7db2289785ceee5cb84a29a1b8026b305ea2a5
-
Filesize
7KB
MD5228176297705f238459b22472cf816a7
SHA1f573d82482787e294fc7099b4a970070e265f72b
SHA2566c82be35c332fec0f221a986c8ee81408324000eb143eba7925e1a7a8334addc
SHA512cd7f610fb5e5ba8f18762a15c33ec301c1861d871a6fb767582879c8d9e9b857f1096fddabaa13c5486c3cde2cb0f4bb39f507026f76fabf1f99843e28e1d829
-
Filesize
7KB
MD51efade3ad3a5f4dd4e3fabc887d14765
SHA1100af94f90a7a154561b539738b3695478fc1f57
SHA25639d276e2cc127d48dfc027fbda73d95b416eeac4ad06ec367e9d23e0d0199328
SHA51295227b59a174e29e3a0e8580a4740d384e00f1baaf8c0b82dbafbaec0b5db81858695785abcd7581ccaf87a00dd4d41bb9eeaf241d3084b847582669b9a4ce38
-
Filesize
7KB
MD5014a2430490be04c7caf5bf6576fafb6
SHA14d62904218ed6854ddc92160aa596c1a1fddfec6
SHA2569e5ae16fefa39cea320852c65302f57173b4efa2950e9ec3988d572a15897e35
SHA5126b77814491348768e69344bd54ce130b168a49a25093206264cbfdc26fd4730be59eeaa5a708595b2a6025a2c256814f8a34fcdd913a312f8295c190df58e8fc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b05507ff-d1e4-438d-af1c-096b3ceabd2b.tmp
Filesize5KB
MD528a56ad5dd65c4e7786bf8ed5d6f2e7d
SHA1600f136aba71774649e262bb55a4713adb3fb3e1
SHA256868fa48d4fadc8d7f4c490a10aae839ce05b780e953e342baa54a49d39b1f492
SHA512a16563b344363f06abd20fc363188edaeaef5578ce8e174fc631eb879054c0ab52c6a3222a87a6bca4fd2bcb940e9e471be4c61209dc749f7cb1f267825975a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbdba988cd3a709838e368425eca5d06
SHA11d5eeca646362be7501eec0b21ab04f7d50d5ba0
SHA256f6c920a019630499dfc2a5cdfc1743d4400eb8ce0cd0bdea32cd2340016a556a
SHA512dbe75cfa02c2bcd712f3e25e166dd321b55900c4cf225026f91b731f99c82fd4295c17c4c2154edb372d161b4260a5cc91398f6d32ac09ecd9bebbbb969ddf8e