Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
fad5dfe90b5e99dd17de63a394a5a590_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fad5dfe90b5e99dd17de63a394a5a590_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fad5dfe90b5e99dd17de63a394a5a590_JaffaCakes118.html
-
Size
78KB
-
MD5
fad5dfe90b5e99dd17de63a394a5a590
-
SHA1
21a92f5594c6d90d4941f2997326a4248779b2c8
-
SHA256
8de7c24ced4fb153b3aa70a9ab1d3aec2039d3d1d83d61014ef0db128f51ca8c
-
SHA512
94112963cf737da257a5b8ca9939b28bfb9dbab074d55656194c9887db528ef8d52036c0fb528f98a7fc2065bf2527580e925cd461e9105daa0e3ef27509dacb
-
SSDEEP
1536:mdVZyfvOJPR6euNkWzWPxrrv1uY4KVN3txjuntM2ev75AlmnsI:mdVZ2u6eugrrv1uY4lu75Ak
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 4332 msedge.exe 4332 msedge.exe 552 identity_helper.exe 552 identity_helper.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 3228 4332 msedge.exe 83 PID 4332 wrote to memory of 3228 4332 msedge.exe 83 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 3172 4332 msedge.exe 84 PID 4332 wrote to memory of 1848 4332 msedge.exe 85 PID 4332 wrote to memory of 1848 4332 msedge.exe 85 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86 PID 4332 wrote to memory of 1084 4332 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fad5dfe90b5e99dd17de63a394a5a590_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9feca46f8,0x7ff9feca4708,0x7ff9feca47182⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,13327659171763885514,11873256092239862289,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
1KB
MD55d5f3dcad4c10b835ed5c800ffbfb40b
SHA174749ac251e3d2991130c8e923ea36b4090b4d5e
SHA2560eb25500dc90945b5b1756e5526a0801b3367cce52ef157decb3b7e77cf04e09
SHA51255c43b2eb6dfaa2699728d1e29d477ea9347298dbdae2e11082cd0c58770d1db004bb16f069b679db35a7c1a602774c6eec37d455a02b3c3e238b6df425e8c0f
-
Filesize
988B
MD5cadea3717c2609b6b1420bf109ab9634
SHA1820a20b592919502d261fce937aa9bc418ba1170
SHA256702fd86bb4d2600767378b4e3752668fcde1a0b5773c0a3c10545be5f5f09a5a
SHA5122b9d49e2686f532a25eb7ab6efce99bce0098fd344a20add8990f680a6f6c8f29fddada219623b5836493c4eede2b4b4a690d426b976a45b7e9e2233671c646e
-
Filesize
6KB
MD5854c939079e873018e56b91c554d1f8e
SHA1f4233e33327f0fe5d726cc1d820d4df9f8beca39
SHA256f2f44d7795789c047510d06caafe197148e20424a9096494ab2f0220f1e198e4
SHA5123575f1632491f5727607ae9b1f22838237af1c7283f1c8b39b864013f0bdd1ed5fe438437050360dfbbeeef0cce681e22563be2775e31828b34adfa4aab50723
-
Filesize
6KB
MD50b3784f6d57e8d8b5f29179b7b1cec27
SHA1098e2b49211dacd0af7562ffb5a781ed6789d4d6
SHA2569829ad4a038d328a9899d665cecae67de7cfcc724c6a0ffbfd970a9bfb38c3c6
SHA5120d8aa4541681d497f438a73d4358737f7ff9dbd879e12b75e54a4b28d00fb571d6024a5bde584a2f44b914ee4a2d58d6e6b7373a1ae4d597a0ef2809af27e1eb
-
Filesize
5KB
MD5c3b5ade61613255524ab084ee79a8048
SHA198f4e7ecfaa1455b8f3c029775ffa750309e1745
SHA256cca230288bff91736d908cf58f6e7bd33e0f1dc3080e7e13856e2b3722af4f34
SHA512c9b462f478678f47778e4c21c2009856c3288bbf32bda81b5bb1d0fff3ed58d7e46212b1acd6fed15ddf78a7a99e4b1aabdcc89dac205040b0be2580b0c49dce
-
Filesize
1KB
MD52646355dae9f6c78d85981dae0b169fe
SHA14cfc7eb7aa04c7d39133aebfc28ea6932357b077
SHA256c0043de1fb74e7961a42f02ed5b7e85971a1afaf363a33bd8ca0497973dc2bee
SHA512f634d2af815ec2ee03ce9551245293f420e89fe208bce8391d4cf7e20f5d054adf0a8955ae885bd3bd6967d0160cde274f2b41e9e26129359d359799544bb8a4
-
Filesize
1KB
MD59e56004355de797bab9eb25352b47f1a
SHA100094038f47267397304369b7d5bbfc310f691d8
SHA256c5b980bcfd3be3773fdad9bc77af2a8078c651338916a27222c8ca2ceca12814
SHA512d1f34d127ea0877223a11195da1b724078291f012cc10ee3f982cd87088dc159ddd9919bca0fa245aa3319bc10cbd1e69d37f1a711c6f7e02f358d93e4ddb3d7
-
Filesize
372B
MD51ac6b801a43271ce678860f8e8a36cab
SHA1c8f1f90941f86eae563e2ccd8aeb696a44dd582d
SHA256ce73c2bbfb2022ee306c477966478603189f9dedf4954f5c77688491ea0d7fa5
SHA512a61fe0805bfdce31fdf16bc6c25240d545ded72ab3d6dfd6828fa1f7b9435ce89de862f78a456037949fffbd971172957707823e0bae1d6483d5d7c1826bfaa6
-
Filesize
372B
MD58dbcebd004f9c213727e21a6908d2bc1
SHA1c6f73c19bec3788b45b43673ae4a195cc8cb3766
SHA256e84bc8a3e498d4a73f03b495687fc95d84b762e5f8c96f93265e71c78c797d4b
SHA512b2abb54fd1e6ef9b924c64b405b8d91e2dddca521ed85b56079cbc972f94c3ac7f0a1496678eeb51ddead420495966e7c41febd5a181407adf2d3d27a9be1e25
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51c70f3a19396a212325c808ed370e22a
SHA1c9b5f75d75006583f1d92df8e81ce4edf8b3a424
SHA256a4f73b19eef55467e9d53ee1d52a61e2c5af702b7dfda7e3d528568048c9c0af
SHA51257fcc75a4eb89aa91f53b9ce57f29a971ab195115baee3f78c297ee3f74d5bff903bfed11ca0fde7439ecf6d1cf3a75d7f06dafece2753c7f35ca09443ebe63c