Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
332974cc443a047c45e94565e8cb5019_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
332974cc443a047c45e94565e8cb5019_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
332974cc443a047c45e94565e8cb5019_JaffaCakes118.html
-
Size
175KB
-
MD5
332974cc443a047c45e94565e8cb5019
-
SHA1
ef49eb6eed889504c0e05bc1e714f42c617a5f85
-
SHA256
3d5bd4172ab8e2dc710d2f77fc2a18b48f6473faec7004ea00893bff2e14ace0
-
SHA512
80a212711d8216e637063735819071b6c5f35a1e1b92219f248e6640415693368f8a9fa3c5704095d75c945d32f3beb07a5b70f7ed9495fc9b32b4d2a0f40930
-
SSDEEP
1536:Sqt58hd8Wu8pI8Cd8hd8dQg0H//3oS3dGNkFTYfBCJis8+aeTH+WK/Lf1/hmnVSV:SOoT3d/FqBCJiqm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 1580 msedge.exe 1580 msedge.exe 5080 identity_helper.exe 5080 identity_helper.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1580 wrote to memory of 3424 1580 msedge.exe 84 PID 1580 wrote to memory of 3424 1580 msedge.exe 84 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 3348 1580 msedge.exe 85 PID 1580 wrote to memory of 4716 1580 msedge.exe 86 PID 1580 wrote to memory of 4716 1580 msedge.exe 86 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87 PID 1580 wrote to memory of 3304 1580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\332974cc443a047c45e94565e8cb5019_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44046f8,0x7ff8f4404708,0x7ff8f44047182⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8171385908593433150,13932505481040840652,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
19KB
MD5750ac1afc9ee7dd557768978d15fba50
SHA1133e9d996f8168881eb07ba83a018f738f5c35d8
SHA256e1210625fe8a5279775627c004cc39fa045940ed57229f39d3d472c53d306fa0
SHA5121b1dec12c116459a70bc7dcd657aee3c1616e75c26cb02db4775177cc2a76d616e3156c3c12914b8fa826b9009e2715a7a1215c8ba317737d01129418717ae50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5bb863a1021bf1811dc1f629b3ca60974
SHA11a7212bb795f16bf6c6377e6a7a6e984a8f1c7d9
SHA2564bad4ef263673291c5f32dd878d9ca857b653e03a598877b7520b0ac0e0e8437
SHA512d1c38e1b10939ede81e541ea4d5fc469389c062873efbfa79473cb3c2711c4625c696d39f03d6cda633657aa7285c579b5fc8e1cca7d79f1cf2059f3ce63cea6
-
Filesize
2KB
MD54520ea0595e9747bed30bffc20a1528a
SHA1803fe3eb92a6a268e183eb0054a0fae566e3de48
SHA256656b3a21e684854ab0fdcccde34b74b2cb97d913ce31dbfc9a0cdf79370e9b57
SHA512b954d0a9da611411a901c7d715278c60f152d55053fd3ee273f9f96557a3a8c8eacdcb12bec024df85a9e5730fd67cbed30d65915fb03048d10c0e2afb2ae146
-
Filesize
2KB
MD5e25848ddacbeac43719e8b53cdd6992c
SHA18193fa11f1f918bbe85dd36a87c89150beab12b2
SHA256502bcf3d0f377a1cc42b371000ffa733ca55d7c0a7ee2662c0c423f2596b5170
SHA5128364d9eacaea1b81e8270bea5aa7e37885f57b99dea141d69bcb7bd1b575bed2879cc613f4bd04c4872137b4d060b67347523dcee081cb1a32c196a0ae19a71f
-
Filesize
7KB
MD59b28b3bb137bc2e62dc35db33f580c90
SHA1542aa7572c028a9158e56738b9fb9f8804322b1b
SHA2563411dc2e3f74d29fbde311277c9571c94a30913102d8895930423e9671ba4b60
SHA51237befc39f464567127129259da0329027db3942a038d1566fe1206a473a8d6c271a1fde510f61e329e24e2da9266ba83d899da537971c5c378ea5d205d03a05c
-
Filesize
6KB
MD5c2ecaba7982a62ed2c508ab1cf45ee47
SHA124bb6a4e3a23527edec9b937d68c60c96e2d6169
SHA256ad83b725d3ef82f49539e81b22b51c6c9d291e70bf50f581c9715274ed97230a
SHA5124cee9af7e16caaf9416d521117e54090389c235a4b98b1b96c544aee31d45ba094b9fd54be3d17ceba00e44828494188f7b57a456ed55383ea7ff5a9ce8a75c8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5a02592ed82b6922b7ff0e8a1748f22f5
SHA19d5fb1292e3b4c7a476a4ddc43a3b6aa3861a02e
SHA25694ba4d138b7e7f8133bd22e646d894b149b91dd7eb85c20b033dc368207076b6
SHA512900f5655dd3ea9416d0e5cb90e1fb9e3758a541df83de6e9374bc4cf5b42fd107f95cc18559f84e00556531642418e0735b2e6c5423e93f5940546e3815282b8