Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
d1819eb53caf634fbc6d4746309a5d5e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1819eb53caf634fbc6d4746309a5d5e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1819eb53caf634fbc6d4746309a5d5e_JaffaCakes118.html
-
Size
146KB
-
MD5
d1819eb53caf634fbc6d4746309a5d5e
-
SHA1
37f6b48a56326f1638c6af8fe2bd3f779de86ab3
-
SHA256
2437b52468fba2ad66400bdf52c91771b558e4ba0687d080cec034efc26cef62
-
SHA512
35f9158dad65e57056827f865e29fdf394a74ff17ac3465916e4b40792aed7b6b6f7a15d893cc75020414dbbe6e33c5758075dac32d66e57ad92a9623f291f43
-
SSDEEP
3072:+zd0zYfLx9EdvQ3yX8gA4KimbY47dzTlTzQtRFB:ZYMcgA4KiS6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3172 msedge.exe 3172 msedge.exe 3996 identity_helper.exe 3996 identity_helper.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3172 wrote to memory of 1084 3172 msedge.exe 83 PID 3172 wrote to memory of 1084 3172 msedge.exe 83 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 4600 3172 msedge.exe 84 PID 3172 wrote to memory of 3348 3172 msedge.exe 85 PID 3172 wrote to memory of 3348 3172 msedge.exe 85 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86 PID 3172 wrote to memory of 884 3172 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1819eb53caf634fbc6d4746309a5d5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe94a546f8,0x7ffe94a54708,0x7ffe94a547182⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2292 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12541648087019173411,12635448399581257434,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5ca81512a210486d5e3b2d0a347569207
SHA1783cbe3109229595b385cdd937f3edc63262fa21
SHA2564d123a0a9ed7d139b8622e7739d5f19d88e387a5c089ab8ace8b6dcdbd06dc81
SHA51203be2c7911f70fd781280922df217b3d5e91b4e6beb720b564b956b2fc3a49048b62a401bb67ac6bae44d4ba9004ebdbb0cc73c97e46f57fd40250daf22c806e
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5d91f2eaabe646dbada349e481ed4c966
SHA1204b71d923cc9f958026640f716e1d741f61c5c3
SHA256771b920b29568de5fa53cd0525e7f9f023df9974dcdc7e6664df0a3a69ac19cd
SHA512e286b35b0e35100dfac8d230318aca27dec877b5b1959ee443978d3b7d109332ebd21a9e26cd1cc8545c669de46ca104edab3d8940a7b1e45d2d8c10a35c46bd
-
Filesize
2KB
MD5f79de70778cf6b6d97a53ea2e57a05a0
SHA1df4d9fad12df5449329cbd913220250796cff3d9
SHA2563fe4f65b01f5ab96fb41a94445d54dea3bbb0e41beaaf22f9d1e774ca3dd61b4
SHA512fa241c1c194e7859e387e417eb1a9ce3f5d309a116c9708f80030be52d2d3e51cf7d0a4f6f68151f92601f5b5898a5d3428371e507e658aebcfbf157ccd8623e
-
Filesize
5KB
MD5e4ec322278ea0c46e8d591dda6917f22
SHA1435dc4dda26d230982aa9af72076b4dbcf7f5efb
SHA256f5df4b097e09a0cbddc76280387bf7df1ebc1235ea155a897b45fbd92788c0b0
SHA512ce868961407916171d404162dac522093cf7810513762d157e6fb419634cd0bfe494a244333a6ffd9fee43c1d2f36baeb56288f27c4f2d74cfd07ec7f7744297
-
Filesize
6KB
MD525048a2b111595ca065777b1c003a3d9
SHA1fb82e9ad1127eb1ef76e41172acf07a902f7fac2
SHA2560a895b93b253aee774e51d66e3cd7d579ad30c80c205c3c6de8d90d59787fdd9
SHA5124f8ec8b88527c3e7e319ca9815c1e0edaf73b6d27d2164f8eec8b7817393be2a220c7c254402dec7c90330717faa06e483d1d376752d7ee8da46f3ab481be3da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389