Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/08/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
c52492c9cf6985abc1648ae3d01be898_JaffaCakes118.html
Resource
win7-20240705-en
General
-
Target
c52492c9cf6985abc1648ae3d01be898_JaffaCakes118.html
-
Size
49KB
-
MD5
c52492c9cf6985abc1648ae3d01be898
-
SHA1
6ce1cce1f5033841642bfa77589d3d00ed14c63c
-
SHA256
baa1ca0359b2368438a546c34be4d7c84082327a820777f29ca8958dd9e6bdb0
-
SHA512
c2e1bfcd12d5bd26c373bebe97677bf1321b1419d8eed06e748f5e7bc2af8bfbf463a0573436a5fd9e98bae775828729748fdbd3be1fd4fd0fb3d297c265bb5b
-
SSDEEP
768:vNT0EipBJHqeWAkL2wiktdZJxueaohHpYR12Sd7a:VTupBJHqZL2wikvX4eR6Rg
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc 112 https://3d978.com/ -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 3724 msedge.exe 3724 msedge.exe 4220 identity_helper.exe 4220 identity_helper.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 1252 3724 msedge.exe 84 PID 3724 wrote to memory of 1252 3724 msedge.exe 84 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2308 3724 msedge.exe 85 PID 3724 wrote to memory of 2260 3724 msedge.exe 86 PID 3724 wrote to memory of 2260 3724 msedge.exe 86 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87 PID 3724 wrote to memory of 1336 3724 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c52492c9cf6985abc1648ae3d01be898_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6c0f46f8,0x7fff6c0f4708,0x7fff6c0f47182⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15996833219091093946,487338209268389210,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD566b43a436c0c4c8875ebb17dfd0bb899
SHA153f4cc7802eab563be9b395d5cd245d6b7f8068a
SHA256eef2f1909d289757a0ce34b7d6f031eb126214231c4a0f8ae66565ef8b8e87b4
SHA512c042715d0f92fd19539c78ccc1883e92651cccf09b86ab104f8da4055b9e6e121a5aa71cb554e5e748117eea3f0f80045489011ff7cc31377b29aadf3b971421
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD52e44573e70972f887d5cee60bfcad006
SHA130afd645b6455e1dea7edca61b02190044184a34
SHA2564f6581cdecbdd8a73bea340ed6ce0eb4c6dadeb7bc0925c6c78e223b7a238469
SHA5120b522f570c741ad55db02e1cbbcfe9bbd3db28e76db50c29658690e27c797edef46ccdacabb4e4065bd12599852490c5d43695107f9b511d6d1e20e345302c4a
-
Filesize
1KB
MD5c12c175a42c10449c3a18e337521aebe
SHA1ac2032d37df8879f02557cee1f986c5411db5523
SHA2562903ddd3a71a9a20093eb7f9373ad439c2f92974225f20c1cf3727596e884475
SHA5128f9abe8d7990ad2f971efaadf51d5fad3ae9b74b3061dc757f14de963758b1744154ebd9fd1e68530e15ab9b825d339e14c964f58aa4e40b51c5bd31de8f31ae
-
Filesize
1KB
MD5bb338bc15f59a9efa3b5aafaf3cc912f
SHA1d9ee914d774a0b0e3763aa6394d64e719f795014
SHA256b1c42a1fb5504960476f141c4648a9ef98a676d8e42cb5a07b74a1d438d3c15e
SHA512a86eaca9cff1477678d8de97e7279a0cfe37a1e827b00d054b2aeb5f2adf5633737e932f417e26a827bbae04201a8998c7691d4a7abe22fd96e4b0cd2268eef8
-
Filesize
5KB
MD5f0006370cccb967df9b848a88f936642
SHA1df03f88cbd61ec3425e49478e7bf878f1ec7f1f0
SHA256ee7988beaa8fc1b761cf75e9e6f93abab3ac5f5e4ac12851f9db72dd4b76b9cd
SHA5124e598ec9f8fa36a2dfba11309a56e1826f8604e80bda3fc7a1b916d77890326a49ca79094c28f1e1c44dd00da734100a7a1852d7b7cd97b9c7ca70ae0e596403
-
Filesize
6KB
MD524210ec2fc411a5af2a901b7a3d1d6c1
SHA11c3f36a70200f33fa05164d5e695a56035689f29
SHA2568d94155bafe588bafe146e9864c88521f4b82df679fd0d5aea3c729cbf1ad1cb
SHA5121ae282047759ee53f57cc02b1d3c85acfa3f5d78aae2075e70f270bbfa9d17a0229c1b1182508e0f45a8ab86ba845441936bc7e79c060fc7aab092b6991445a9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53e5e9a128ae64f76aeccf86fb67f6add
SHA138341962d7a522ed41c7332c8ff3745365d22cc1
SHA256ead0ffa114541b72600994dc0344639e62f46fe3ca534c0516d1fd293d4f5e88
SHA512194a5128c0277039a18056a7f8e0ac368adb8b759a6211393f0235f25e5c3847afa5ce183802769c909ce47d5e7d34d2592679e3d09b12063c3a5f4769c28f03