Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 06:32
Static task
static1
Behavioral task
behavioral1
Sample
4087abb11e646968815ed9642ba2fa74_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4087abb11e646968815ed9642ba2fa74_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4087abb11e646968815ed9642ba2fa74_JaffaCakes118.html
-
Size
175KB
-
MD5
4087abb11e646968815ed9642ba2fa74
-
SHA1
28a77886b26a7d4db2153cfe671c82327ccb7d38
-
SHA256
8a8374798a1a09c0dfe8b8c08c5cab6e57e3570568d37b74f3ddbb2d023c5fac
-
SHA512
fefbb10cf97556a67b2df94c469d8621c1632d875b652ba491a9bbcf581fe25781e28492ff9e342867a15bb4e9c2061960cb70f190d449d6c486c39ae204e30e
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3kGNkFGYfBCJisH+aeTH+WK/Lf1/hmnVSV:SpoT3k/FPBCJiHm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 716 msedge.exe 716 msedge.exe 1592 msedge.exe 1592 msedge.exe 1816 identity_helper.exe 1816 identity_helper.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe 1592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 4804 1592 msedge.exe 82 PID 1592 wrote to memory of 4804 1592 msedge.exe 82 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 4564 1592 msedge.exe 83 PID 1592 wrote to memory of 716 1592 msedge.exe 84 PID 1592 wrote to memory of 716 1592 msedge.exe 84 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85 PID 1592 wrote to memory of 1560 1592 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4087abb11e646968815ed9642ba2fa74_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9677324032229627586,1974462865996149450,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD522bd873ecab9b51c765625104f0422ac
SHA10f89e42f33f010402f8ecd1537affe8278e325d6
SHA25647be080afed083dca949caea0f27dd615499367f627fe4be991213068e11345d
SHA51208b566c32bf82c41a9b07d3270b334198cfd66de79a8ebfcf8905e59dbd465acf40f3f1af483d8e61f5bf3769802fceec932d1f453ee3d12c40aa0c8f1917c93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir\the-real-index
Filesize72B
MD5b5dc3be266b59888a97e4586ec328516
SHA16ebd6956fc2d814f1325021246a83ee324018a76
SHA25614f4ffa0b3a0b5ed2862e66b0b62a02869de78dc71bc117a31768a7504d58ee3
SHA512f3c89b65cb6d793e90ae55d5e78da88191dabd8ca447acb17bc5c541e2843502348c32c8bc0e45e216c1d6be04eb86c2c2cf17de4eae526aeeeac5c90fabf8a2
-
Filesize
2KB
MD569bbb5a050097b9aaa170539d895511c
SHA1dfdf5d41ff627fcdbadb05b4cc54682c823ec36e
SHA2563fa514b66774fc460b288de77d4fb7ccc54f95b187ddcdefe740d22657c68a7f
SHA5123e7adc62c0a3853ba346864404371e39b20e17449a49790953a95d22fa6633a11308abd4c9f0880000d38c5ff96be4da96184df9ad4c10a626b8b57633213b7a
-
Filesize
2KB
MD57b46b4a4bf2fc2935ba2b62cbf3d2b2a
SHA13ca05576914b97b08f4a2c472ed22187145be64d
SHA256491f802b018777fbdf44fd24b78d32a5e46d9887c1e7661982eec23752862fb0
SHA51297ec6be1b5f07a44f8f271199e3b0ec49dca0eccd6437878455920503affd34bc02de6e435a0815a279bdfefc66a16c7fd75f90b271dfe633d105a9251e19372
-
Filesize
6KB
MD55a1d7807f08a6b7776fc84000b5819e3
SHA14b25cc9b95ab38cd55a63ba4fae80511af9f0fd9
SHA256b2c50c241857a9d0bf8a82dbc59d6f3db470c75942d0f03ba93df05646583091
SHA512a7120567494329b8bd0396b1c0db27d193d51501c55dae2d53cc07f0618ef7d1acc4ec497b84b6b24fedc3e2b7a9c14634e2a062186868e68f17ec50459b9596
-
Filesize
7KB
MD534438c6b21ed26c15e5baa18546b5e14
SHA17898c97104f5a0fd86dacfe00bc34b68758af27d
SHA256377bf768b3b57c6f9827ab9258efeca305e44fead85455a9534703baf9552338
SHA512d8db19e143d3d2e92e23e4b63f3f7cf657652e03165dd64d11302b24edd11f29ee8d47a9e1f418717858db22964720b1a2be138c2011c9eae2b3a170ea581aca
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58da1dfc448ce53f6bcaf9589ea76dce8
SHA1bcf75a909d6e19462b47e5c0ae593bb79d948e52
SHA256c611e2b87e58a700921a6609cf97f9832d718e05013fe2bca66a278250165a48
SHA5122816c7e4c489ec07838a8c79337b6424a7bb9a71521d147a0005f1d6b8b1e691e6a5fb8ab437ad0aa3ae58cdc9230b60ace0f36b93caa84dc10e624ed5736111