Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
07ba7bf9944a76e036b2b4427cb4d27b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07ba7bf9944a76e036b2b4427cb4d27b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
07ba7bf9944a76e036b2b4427cb4d27b_JaffaCakes118.html
-
Size
20KB
-
MD5
07ba7bf9944a76e036b2b4427cb4d27b
-
SHA1
cd2d7ebaf4dd3fd0d9cb775233d9d237c08881a7
-
SHA256
242d875492f758d8c87e57566744321ce98a94207eb673ca7534e11dc422f3b3
-
SHA512
2ce784c73c25e47dd224f40450f1ffed5811ac2f30f8aa14c280f62b11fea4f89a426cfd94a1bd213d05e39ca80a8e5e2b8df4af9ffb0975c6deb5e1a063b0da
-
SSDEEP
384:PQ6INKrqLw/jIBJQfF6QOhOcAXwwPp+XWwPOq9+b1GEZ6JI85:5IQWLQjIPQfF5RcFAD85
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 4540 msedge.exe 4540 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1308 4540 msedge.exe 82 PID 4540 wrote to memory of 1308 4540 msedge.exe 82 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 4504 4540 msedge.exe 83 PID 4540 wrote to memory of 3600 4540 msedge.exe 84 PID 4540 wrote to memory of 3600 4540 msedge.exe 84 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85 PID 4540 wrote to memory of 800 4540 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\07ba7bf9944a76e036b2b4427cb4d27b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8c1346f8,0x7ffd8c134708,0x7ffd8c1347182⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1820 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1328 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9206918276199114834,16239531733678782825,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD585255f89b1a6fe216df0abf0d271eb1e
SHA1ac8d457ef788f6fedfd88f95edeb854cfa42fc8b
SHA256c20dd62eabc3ea268c95d385139256e1ba71bd9f59aef4e130a6f8275d41dd60
SHA5128fb8d20b8452b410eed58a1b5dd3657c684459217b61e9c28d36d233dfff72492d309da3e8f0bb04e36165486987307cb60bf1c4e2eff186e4a2ccfdf16d863d
-
Filesize
1KB
MD5598ca7742c4842180bc0bec8f2082c7a
SHA1c50da6c27c9683e2c2ac9cb2c316aa199c6bc890
SHA256f5a1b8f16219b7aba90af8522d9e87d4be2a704f20b640b79d8e1edaf4ffbd82
SHA51287f5c1328f8614ba0f6358a5a0e31020b0ac87ceaf6fc03e071bbb155537b123dcf1d15d3b05729307acba90754895666cc431b77e88af3fa74e0134e5353691
-
Filesize
1KB
MD53f2bf4c64796d6ca04fb879a3291f6c1
SHA16900c6c1593a527c34a4aa8a7cec0f839a18d749
SHA2563486490699369770fa49e90b30e0afc7067855e6e5a7c0fd8f7360b4057a7164
SHA512497ff1d18512a4152869ff5164124af157016557cd57029531721aae86a36fd379d3ea018190e69c481121fd0e9e9a37156cf4cfc4271a262773e6c7cd4a7cb0
-
Filesize
6KB
MD5bfc04e7eefbe5f015f4962880332a61a
SHA1eed088aa51ca68bc57b62e9e9eddfb9bfa3042e3
SHA256f290c52b37b4d7299ba5644e7b5b6bfca8355ae5631d660250c8973a279631bf
SHA51233f0f8a5caff7a8ca2f128d4f823b1e5cae2c03d11e46f19c09036023ceb28f7c52a1b8de8e42a8c7b48eb248db4a2624a08ddb5da38cfde0fb7141f9d2ea53f
-
Filesize
6KB
MD5d6287d00f662d1dd514d2cfa03ba78c5
SHA160f03c2d8e049d507f64f6e79217376506e209f3
SHA256e1c486c57ef36ff4938389a41b49464c1d5d1bbb30b41d2dec4295df67613589
SHA5124ed340329b0864538c1abdefd8d324fd39cc40695dcb6325fc5263cf433315068e02d9fd5bdb4893546f06bb8409b045ef7614f650cd491cd4f41798dabc86de
-
Filesize
705B
MD5a9e5b5e99729a37871d160bf8cb11210
SHA1b049a579a02a677acd4436721d291c3f7a3534b4
SHA25606bac201abe254c4f74ce820e6edd2736d06dc21a66ffda3a73d8772ee5da57a
SHA5127cf4d244081a9f5ccbe81555690977c043bf9938dcf34bd42c6a3a629dfa67ef38f999ed92b32910b22efd9b04c883271cd9e158b44bde105d8ce4fc29718fd5
-
Filesize
371B
MD5153ce761dd2bd85aa78b99b1f15cee5d
SHA101381110c99a9e994bcc0b5380b76b9a9f3ad63c
SHA25659030ec16254df772f0af12f38b3ad26c669bce61362f17eb5b92dd04147a187
SHA512b835585a06bc7e7e9848cd653921e80b00767fa2690daea215a5e918e49db04744ca4f36aa2f09c02c3c6344cb26dd2d508407090a4df20dc4e70094768a474b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5182405e3f74c35d7d97ea36165b22677
SHA1d22bf2d1437948b063d066ca7e6743bebf25b4e2
SHA25686bddf4988f35d586ca9ef1547e678bb7c4c6f21f538abf8032185fe5431e872
SHA51245c8ecb4d134595afaf3704ae2c600db65e49602b4e9a160b440bb44b188c3c5533c44e88e393ebe26f39a5de19e6975352d8f11f2975af3812753fd36627973