Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
44fd54f15fa18641b98edf2d070543fd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
44fd54f15fa18641b98edf2d070543fd_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
44fd54f15fa18641b98edf2d070543fd_JaffaCakes118.html
-
Size
62KB
-
MD5
44fd54f15fa18641b98edf2d070543fd
-
SHA1
da75ca63e48685b464e6cdce79a63b2f2646aa24
-
SHA256
0f6aba50d67ba317a0788d464b000fd674bddb052776e9e244f7e1acee58bfcf
-
SHA512
8f1ef75462639e6896e4af944ea017707351844e5310000a9d453db665abcdc3d000f65ceaa5013db051270eda0e248125679a7934882d5db15595acce70f725
-
SSDEEP
1536:ajwpD320if/8hw7wBxwzQBwCRwolwcnwpfwarwjzvwlBwcTw+hDwzgwQkxlJZQOU:ajwpD32PfkiOp7GlT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4236 msedge.exe 4236 msedge.exe 632 identity_helper.exe 632 identity_helper.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 2740 4236 msedge.exe 85 PID 4236 wrote to memory of 2740 4236 msedge.exe 85 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 3224 4236 msedge.exe 86 PID 4236 wrote to memory of 4632 4236 msedge.exe 87 PID 4236 wrote to memory of 4632 4236 msedge.exe 87 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88 PID 4236 wrote to memory of 3924 4236 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44fd54f15fa18641b98edf2d070543fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9e7046f8,0x7ffa9e704708,0x7ffa9e7047182⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,6701675414989597758,162700676635615617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
32KB
MD5f69ec88aaf8e4e6c8757a523eca2a6bd
SHA123c42b75e088886466fca7dc0295d0e3ff20568c
SHA256a8ac8c6c9cae5af31953ff6be9933f5317856ed2305a921928ce21f87958f43e
SHA5122b08955a87cd41a5cb97673eb086bad6049d388131813494f551d97ee95d5899a4dc4f9f3820f9a56c759cccf442ceda2c14eb10be440015aebb59cde48d5aa2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5d0b088f5e1868c2c5028841348a3ce25
SHA177a838960a19fb77f2799815ae0cf8e9d848c7f8
SHA256c115531369376d0330deea65031a560f03041cbc467772488577b8dff78f5269
SHA5122ee5d29b231884f2c1ae20a1f288b356047495e46aeb1c2173db60a94f7f35f73c5651eed49a6fa92eb9bbab6a1ee19dd9faae90562070fcf4b0a4ba0404c3bd
-
Filesize
3KB
MD5df5bd42e3ba493d8567bae83552bd371
SHA1b1c340f5b0be87f507dd1173ad0e2d5795ac72dd
SHA256915a1a9bf883eafea673b75caf1fbbba3d8823b3db980cb937d4991514cd30c1
SHA512151084e07d4c4191e601fc9ad578dd22c72bd5d0463545f5995addfd5a339143b2ed3ba8a517a1fb3a2bff8010e91b6e8ab3e3bf9584102f7d3343aecf5fabc7
-
Filesize
3KB
MD55fc76d79789e0b7a1690ca3b1b476fac
SHA12001be2d2f5768b57f11b27d8c52e30a8e4de165
SHA2561abcd6ec8fce2b1d4b5c01b4d3de9b0a9b8e38ea24908ee69f923edb57a43799
SHA5126ef3d1fc2501e0434c7c7dc834329db183c964656cbabd881dc275ca5ae744946a85d6fbd03d4b9baf687b5a1771fe1fdfa17944290fd38cfc14d7fcef4744f0
-
Filesize
7KB
MD5208ccbf9f0b7351aa2fa8c65d9f37dc5
SHA16b41329e2318257dd67d4a10e75b597b0636f5ed
SHA256f46e2f1dd0095798a33c741c21355ca404c369e7421fb4de00977a2676419521
SHA512f32ebd546568d1623cfc7eca9b53658ce3db82f4f9587473f2be67777dd20124dcc2957e70009a1e217a8703f0f36f0effb6fa558709a8e65e639c1784aa2054
-
Filesize
5KB
MD5bd4626bcf07dc0e11677447dc9c6c184
SHA19c8f04b84dfcdaf83634120f4e872794297f06b0
SHA2560d838c350f875fd369a2028ea524dd45e9ce4ab22b69f7e075f555c3da95a1d5
SHA51273111d0eac650cad6401a33ed6955d296a931c9d4a76debd2031685ec1e0482c62f0f43430ee990a6aa79964d935e58b22f8cdbe0a7a90d4704f1bc6a8b45f8b
-
Filesize
7KB
MD5e220bda0d292abb0adfcb2b6bd130208
SHA1f7a26a452f5e9b0d0830f5ecfc53a7a09ce0a9fb
SHA256671bd859e074b1a00f6f4fd7c372a3f0362aa04b7a5fb831fcaf555f510a9323
SHA512f7e16e7dac71fc751d2b586eeffd8c38f61c2b8cb04fb0038884f9ddd9ad588a7c2c8dad49107f2358b886106f140bc637135fc664cf1300c023c6d4208787bc
-
Filesize
7KB
MD53baa55d2afa81d5981b643000fe22cba
SHA1f074f57af7e55e5d72baf048dee34c5bd2999818
SHA256a2d881c5ac53607c57e77cde3971922ab7f544101adbdf9473239dd8a70ebb3a
SHA5127c858b1764353c4ee50311e7396558de0a09e652234c2bc9a91b9abb577caefd5fb297386043a72df3d370e11fe20a382d08b9483aa2606ff7e9ad4581dbfed9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5913c333a20ad06ceecf725548ce4eb49
SHA10859ebe8a2bf7651d0ac6754523abd7f2e38098f
SHA2568c23fb1fa55c9243f8352a2299064a3debecd38609f880f3bf2a19730d150bfc
SHA512e27c687369105fa4239da6804640c2858625f3e4730368b3e5e001dec2e2da72a9055cededf309907754f56bb12cd14493b716e9c81edef2c4f8ba1949eba880