Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
c1719cb0072fbbaa64daa398b6934abe_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c1719cb0072fbbaa64daa398b6934abe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1719cb0072fbbaa64daa398b6934abe_JaffaCakes118.html
-
Size
276B
-
MD5
c1719cb0072fbbaa64daa398b6934abe
-
SHA1
7ca7d1247f313be44633ffe6ab64ef1692c8415c
-
SHA256
793e7aded00a58ef40dff47657f5db068695c46bb2ac8dbfa1c3efcdd1dea6fe
-
SHA512
644b263a5e15bb8804b73ed4cbfb7c2bf2342db9b38550e4f38bed520265daf25a529bfcd289284fe176fc5ed51ac3f2d6d178353b511315bd58e904f36c519c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 2056 msedge.exe 2056 msedge.exe 3540 identity_helper.exe 3540 identity_helper.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4876 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4876 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1412 2056 msedge.exe 85 PID 2056 wrote to memory of 1412 2056 msedge.exe 85 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 2640 2056 msedge.exe 86 PID 2056 wrote to memory of 1540 2056 msedge.exe 87 PID 2056 wrote to memory of 1540 2056 msedge.exe 87 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88 PID 2056 wrote to memory of 8 2056 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c1719cb0072fbbaa64daa398b6934abe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67b646f8,0x7ffa67b64708,0x7ffa67b647182⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4192 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5173469608503228914,7638112520916957921,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x3301⤵
- Suspicious use of AdjustPrivilegeToken
PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5856d89c157558e3f75d862f4f81ae047
SHA1a30bc396ecbd0ddd625352d461b2c30cfd74e24c
SHA25621cfc276a0411ae3cded76e7d406a0f97859eef75f464b5fe0dc80636d5d9ef8
SHA512c5a024f9545689af53f7db95c6debe9fa3b4fb724dd64fab370967f879994bcf3b0400f238d209cd1e186fea69e467a22a6699293619ef1b769aec651ed5662f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD50c006b6b526b884aab119c94b3b43ede
SHA13696f60f0a6ae15fc1a8b5a26f3f0af16d9cdddf
SHA256b9a6ae32757fc974a255d5a0b27c1d739922a2cffa0e8e729487b3b7b7d1e7b7
SHA512f7937166506fcbebc571db0423128c2192f3d7638b3416f3c63886e923d3be5819a96c478ebca629fca1ac45c4e8a75761c2242438f5edb602da009e377b9c8b
-
Filesize
5KB
MD543e5dbc56005853df0fdf49c0e0da93a
SHA1c45bb1d40bac4e401af98982ac28cc4341769e0e
SHA256b5e0daa949c57b467a05a5d60c0051a419b3265903f94e9c93308b7068412f90
SHA512647d1c8389c1956c78622fa994123b5cf771f4861fee51df00dbb5a191d0a292727abfd93a30f9cb4da6f9274c06e891e5c8e471dc475ebd44320ae0177b1a84
-
Filesize
6KB
MD5fb5df1e0daef042c71d7bad3c2d90b63
SHA1921d15f1fef456e55e2a129b1c48f7d46a5fbeb7
SHA25656ad4728638256201616b3ac3e3f7ab0c1c922798ec54697855fa9973ef4c9de
SHA512e305ec392f677882f834a435d8f3da564e4cda2d1a526da700c2957ff749cbef18822b77df41a76f03e72288b48feeacab35033de4bf5597feba61c50d0da560
-
Filesize
707B
MD581a3195d5f9ef28c0739c440c1655e14
SHA1af72936e71a024559b04381f67176fffa917bff1
SHA256959db54da2bd69889beb22295c2f0b9e3186fb6a429ac27b5086198ec5c2e40c
SHA5120e24e4c1442fdba17eeb7e59929ed0c1df131a6aab32b57073482ca230550093efab5d392c23e5a7123267bae83c76acbcbb83ac58f9a46c162fc7aa936433c4
-
Filesize
707B
MD535e1e7ccfc6e77bd77da0f59fb2088c5
SHA1eea46e94fff2a7dcdd8b223273000b8ea1a17c6f
SHA2565ee605cf01416df74f32a7d8257312f0cf616d500f8d3da69add17a11c0e35eb
SHA512e26736987c189b49cc3869c0a1827429289945b6ba9294454dbbe67e4babc342eabd967ffe21f37846c68557d34956a48bc52a4672bbe5ab6d57053ce309a94f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6dd39df56ab0e755a7dd29b841930b8
SHA1f31d08733780b1c405ab264dc7123dea3040e7b3
SHA2564c666c4aa1aaa10d9cf96f3892400f4e82d25aef3d6c15d2a46e94afa230003a
SHA5126b7c2e469b5aead80f326b52de65c2295b9589f4ea01f812fbf07fa73cd75f37eea3c55c0a8a3f4e547bd6884a98e23534ae37dfe4b145edd62b50d1709f2579