Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 13:55
Static task
static1
Behavioral task
behavioral1
Sample
13065c3f044a6852adb9212f37051638_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13065c3f044a6852adb9212f37051638_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13065c3f044a6852adb9212f37051638_JaffaCakes118.html
-
Size
44KB
-
MD5
13065c3f044a6852adb9212f37051638
-
SHA1
0c7af4c621ba0a90e523bbe0f53b6aaacb044914
-
SHA256
0a298654c75d368dbd6c49a42ee1a761684affa38eb45504a3aec68fc4ff005b
-
SHA512
3f1ffc851ad8eb5ed7c59642848473d9bb6cbf9eb97911edf0dc7f14d578ce7616d37bc109e2699a4e39a1de0e030f2176c1785c6cd56826316d1976db950b6a
-
SSDEEP
768:8iu5DQkzNhFVGQ0ybTkdERFRCsCY0JRhlcHCbvh2oO/EmB:8iOQkzNhFVGQRbTpX/CY5H8vEoO/EmB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 2172 msedge.exe 2172 msedge.exe 3772 identity_helper.exe 3772 identity_helper.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe 3732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1072 2172 msedge.exe 83 PID 2172 wrote to memory of 1072 2172 msedge.exe 83 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3348 2172 msedge.exe 84 PID 2172 wrote to memory of 3484 2172 msedge.exe 85 PID 2172 wrote to memory of 3484 2172 msedge.exe 85 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86 PID 2172 wrote to memory of 2152 2172 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13065c3f044a6852adb9212f37051638_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3af846f8,0x7ffe3af84708,0x7ffe3af847182⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1404 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7574203814907789949,14152576293012804523,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
200KB
MD5a484f2f3418f65b8214cbcd3e4a31057
SHA15c002c51b67db40f88b6895a5d5caa67608a65ce
SHA25679cbe928773386d07f0127f256f383debed5ccea5ff230465bf46ec7c87319d6
SHA5120be1bb8db08f6e6041a85cfee90cd36a5b595afbca34d52a125465454fc806b4bb7ae569eaf4c882922fb1b962b6060534e597791cd0ad23483be5981d9be85c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD53cc76fdb56035e813f0d97dc98d4909b
SHA1764be151eba31ba21da48f0d5530db0d80fc4d51
SHA256a2354bdf65963f689318221b1624d854d466893a74a72929fd18407e0fe2879b
SHA512934365b500ff8c56f8fa7cc8de2703dc30f520c52ca0a18a3f6dc6b0be90ef627e0da64e991f9d1f516e266c958d784efb75c95aaafbe4f20f9e87a817a24ffa
-
Filesize
398B
MD58a0a027825a36d032b553d4974b686f0
SHA1e2c9e8ab6224c5070e03593a76a21c85b5f5ca9b
SHA256390a66346b8b3d272a62c2af27a3d613ca218d8b66400381d526f3a8e35baedc
SHA5129f0363d4be405db46a4142af3c3777c35ec0e1b79df46b818e96c302f02411029f5b647df6c6677ab4426c0ad9ae5dbc3c8871a27292ca24bd51d1a385aca319
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
398B
MD58e60c7b01e91737dffdd43b46baaa4c9
SHA1002003de450448b9febd4af78b6e6b0985fe1594
SHA2565adf9197a5b6c64698d68d6a04b90a9f5986cebd7484fd1ec0cea94350abdc90
SHA5124666ea2b869117886c28b8fae5aa60fd6d5cf9bd47a3ca3e626752b75588b33fc064100be1b097af46a697a2062ad960a91d9fb2a4cd4dd9668cec64b89ddac4
-
Filesize
6KB
MD57610c05fc9d5b79957373d68cf917272
SHA1cba7bbfcfd547b5ec6b4de9be60311a1d45dafbc
SHA2569280b3d035fce99ef888b586ca3c089a2dd54529148cf146ac6540892b080d23
SHA512265854924252511bdb6f97ea95e1b9d6fa9b3a569ebd1f057fadaacc1f1b15fece9fed8e7795c81a69360cac5daf1328ced8c4a78441c4f6bfbbd6d00a911c61
-
Filesize
5KB
MD5dea9307a8b4926571ed958e1a31047ac
SHA1be9380d591447503024f2e0bdac7f7de1755f577
SHA25610b07cde39f30be600790ce6d5eec9480d852bf7f531681491036bd6fa81c3c4
SHA51245c3a41fffa87ddd696d6f594876054965d07068fa57a7776910d6bf40feae2d7f26829010ccb85163aa57fecbbe0f6c4db7d7cbaa0e6dd79a8209adceb80f7e
-
Filesize
6KB
MD5b262a4fd703938981c232d8ea5863c0a
SHA12275abb2ccc6101c1f3109e36e953da04d6482e6
SHA2569b3425a6825f211cb6d8e6731632f8c3705f5c490069f4be09cd30c483b61906
SHA51274de3b2db8f9b5d1f216d85ec26ab2bf0c9448b01d91a832c22b950cda4f74416f5c050ac61b3e595f07a7bf4f7e2678fdbc0849c9c2d59710d9d18b2784e851
-
Filesize
6KB
MD5e9ec7eef77ae7890f771125c6f758d37
SHA1581e06a2b11a4cd681e6fdb958cd9622d73c3f62
SHA25603d8e85fc7cd817e8432f8ce34d757f813de44baef2f04b35939756766bfd812
SHA512975338158197af5143dba311fc6763bc6f58ac112c4f1ea6749d33b732b96a7e82c0508de36c694d1581e4d33ed76888f65f0630b8653817046090e8baa11925
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5459dd4039e44914f1fd5d60b3e0c92b6
SHA15fd374d513ae1853402edea55d7597c0213808dd
SHA256e769ff5e34c5cdc917d02c2612ee90e06e7f72d258abbffd146161bc8eecfbbd
SHA512570a4b63798febb01218de9bff01f2018d28283ed491b060a2796ea1ff7f3ca97cec99be1fb74fade797151048be53f8b0d60fbeb4705f9d09e0c1b8bb684fd3