Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
fc059236b3601884ace15c0beed16bd3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fc059236b3601884ace15c0beed16bd3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc059236b3601884ace15c0beed16bd3_JaffaCakes118.html
-
Size
68KB
-
MD5
fc059236b3601884ace15c0beed16bd3
-
SHA1
7385eb31dd3794b78f491c8bcbe5685227db799e
-
SHA256
a8d880ac645f936eb9754482b8aba1fd52949d76067e84b498a84a67c7f32a15
-
SHA512
a2a6c276955dc470de3ad9fe1082586ff5b0601a52669cd9fb1ef342ef6ff3658abd0861be1e310bf5e80356832af060bfd0798cb309bf5eace09c1c4da29945
-
SSDEEP
768:RkysJ5spj3gGEDFlKU/hUeXHO+2fil7lswR5R9TbRSDC29zzUx:Rk5spj3GDFllHHO+2Ups2h1SDYx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4588 msedge.exe 4588 msedge.exe 644 identity_helper.exe 644 identity_helper.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3600 4588 msedge.exe 82 PID 4588 wrote to memory of 3600 4588 msedge.exe 82 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 2744 4588 msedge.exe 83 PID 4588 wrote to memory of 4632 4588 msedge.exe 84 PID 4588 wrote to memory of 4632 4588 msedge.exe 84 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85 PID 4588 wrote to memory of 3980 4588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc059236b3601884ace15c0beed16bd3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff381446f8,0x7fff38144708,0x7fff381447182⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7088 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,16100620685854145418,1358092249603324781,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5d2c5c598bf43c417cc7c01f342954233
SHA12e5addfc2c0ef9a1bc37c8a00624b8f946455557
SHA2566baeabec53c0cf0cfe8f917e64bffe2aff76249edfed24d67d30679eda5035ae
SHA51240f0605f9ac4b47c37a9970d2a2e142aafab3abb0a3b437f10907ec15cf42695705e071a218fe2617d5c91583c1bd462ce8d1c512e86b52b672ce17de45c3c37
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD536da54783c4fd261ecb6865a2d5cd6e6
SHA10a02489565d7b2e97e18e23228f906c66299b2a8
SHA256df9a516e8e58c4a8a80d04dcb8358dcf8fa68a69034d5a4bb5e5c425092da270
SHA512ea203568c38985a70b2e53c5c958d6197f34eef853224983bfd4ed7735738b8d06ce339cc71fed6c36c95bfa52c959168a320d33a4e2079e3487a24f8657eaf6
-
Filesize
2KB
MD5054debf4a973d2482bd691be1e055d4e
SHA13c6f44cfce21adf550ee9946a013de51bf5f8b04
SHA25616597f4a2537138d4aee88705bb3e9caab21355a32d7809d98576d85d1c24a9a
SHA51228d0cea167e9cccfb859354dc323b7dd627ae4e38c633e8574a04d52508c1a4e8d1e700a0f18066c7c7eceda2dbd7e47ec5f990d1d19d7c4fd5b8263c1b2fd1a
-
Filesize
2KB
MD574faee705b273433d764403b85e60587
SHA1498d5d7782e44a690c8d928352e2b075183bdaf3
SHA25627fbdcef11a55e23514d41910ca89833d4ce2ebcabde71c7407900dd5731a68e
SHA512b6e20038a47c21455b3f395586de8b22081817de7935e097d978f2861ac10ac419a3ec871ea8f5d81aa88e932c132a1b7709b52d2676236a1dba4915a2a1b466
-
Filesize
7KB
MD538e3edaee523b85f61b25f9e8f6ec103
SHA152f2076dbb40e9ee9921307b6af68ae9adde3761
SHA256b3be89d00a2263cbc0156729b1b5a3686d365d4c0635019a3ac3f58b651c1e6e
SHA512be33fe4a240d293eec0ac7b9f7e7609a9b84e8135b3af8d87950281966a8ebbc2cbc888ceb02b6fd9c60f82baa7e692647b53c5922fe53f2bd3b6b6b0e0849d5
-
Filesize
7KB
MD54395eecae4ae6802e4e2cebf0f5e4b8a
SHA108cbf590001bf7602dffbb54c7a92269d00c363d
SHA256cd51817c28f35725e84368b850b9594bfc86ce68b797b13e491d4a47c0e51636
SHA5127e5e7050f33366a129e30406910161066c05b3fc2b3810b30e4ce6f6d8153a9f1468303655fb67ddb0038fc3b2cfbd071554b56601615c711bcea169295f62fc
-
Filesize
5KB
MD585709b751229360b93ed07e77f985040
SHA11d7962517f8da3da976094ce2456e289d8390cfe
SHA25680d21df12cd6b564a4fbb625c7fc0ebfaa02877610291dd6842a357b1ded4e20
SHA5128f25a8c1bd0bf9487e5f0192a50b96d01b65b289c740cb38dde81db4333088f74914a7e1bbc12ac1db9a66c25c03bf9a216613d517e5b67b13a6d172b38d8f8f
-
Filesize
7KB
MD508fa7ad95d7e3ec660ff89fb1bbda988
SHA1cf42d6c1fb3277c774a325118cfc29e58d9e6fa9
SHA256add14a68eb3516f5005606b25832d76b8a8e4988d8321783eee478bfceb3fe5b
SHA512e0dfa018d60cc0b14ed12ccda2238f61b86bc7ecfd7dd0ffc0cfdd029f69a966f1c28b77e2f7906c99d8f262548aa11f06f2131cb58188bc72b52ff084ba9511
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD527501246ff5aac76b554f3b400119522
SHA1943d24748d9d7b27281f4516cf39a915815654c1
SHA2566e5553794d8135cbc20ca8c1cd32b9ec03268c9ce1358cf36fef3375ab24df12
SHA5128b993f3721157dcbcf64e857fa702d569d3366b6e155cd263e74341fd2415698764af1dc3c4192428c66d76ad344433cda82eed02fe08e0bcd44de441dcea863