Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
5b486dcaf6960c6ab5af7f6dbc1be930_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5b486dcaf6960c6ab5af7f6dbc1be930_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5b486dcaf6960c6ab5af7f6dbc1be930_JaffaCakes118.html
-
Size
175KB
-
MD5
5b486dcaf6960c6ab5af7f6dbc1be930
-
SHA1
17011f5d6c643080e0499521ee61130126da86c3
-
SHA256
2bc5f86af8e2fa0dcdb228ba09fb1f6642e3bf325cabdf9f8bba6c6389de3e6a
-
SHA512
23e0a0d015ff8756a1fa58a152dd003b369c815422f30be5deebcd490c7634d9ef4ef3f255d79c9e7d0cba98ac95542d156379bdc7e66c4cf84128c6fc87f58b
-
SSDEEP
1536:Sqt98gd8Wu8pI8Cd8hd8dQgbH//WoS3LGNkFlYfBCJiZw+aeTH+WK/Lf1/hpnVSV:S9CT3L/FQBCJijB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 952 msedge.exe 952 msedge.exe 1564 msedge.exe 1564 msedge.exe 4376 identity_helper.exe 4376 identity_helper.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe 1348 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1564 wrote to memory of 428 1564 msedge.exe 83 PID 1564 wrote to memory of 428 1564 msedge.exe 83 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 4204 1564 msedge.exe 84 PID 1564 wrote to memory of 952 1564 msedge.exe 85 PID 1564 wrote to memory of 952 1564 msedge.exe 85 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86 PID 1564 wrote to memory of 1732 1564 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b486dcaf6960c6ab5af7f6dbc1be930_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84ef46f8,0x7ffa84ef4708,0x7ffa84ef47182⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,7706221271718939537,17504646650057268715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD55a646c1da5e6a1a2150e18135ec437a9
SHA1b735d164337cc997ee0be4bd95dc4c9ae87a8e1a
SHA2562b28d3ea279dad3287401ebd11485d21feae17bacb1cf8a1a739c2a9ab919771
SHA512b0d501426b9eec51f15e28fa56bf48eb97868e0b96a73e269b0486ab53941d65ff9591d589710f25fca4a0d5c977fb2d1c0cda94a7b92ea62468b00560a9e8e6
-
Filesize
2KB
MD558ebb0124c30c80a1a3120a00d5a1ae2
SHA174d137892454cf1900bb08f598474c1137d92539
SHA2560a3a32f22abfa02a5d09dadf57c2373df694e1bf403e56459dd7acdba1e8140b
SHA51219f41a002080aaa0820f6b12d708dd657b31bbcf8a56588b79f89df19c5dfb8dc94a6f890137a24d629f762a29a08be6bf1655136aab938a3642fe9de8d2ad1a
-
Filesize
2KB
MD5514b1b871a0bfcdd18dee92c940788f2
SHA146e7cb791d54de96fd574f6140e0e7fc980bc280
SHA256505e6409268153dc8565c4416cdf36b77081cd7025ad77ec024b70239f4e6ecd
SHA512e97978f2b9ac05ba2f3158f85cb23cb1643e8359d01864db64a63838e45ed73abeb229d8f82930f293458d703b8132dc3b60557cce77c9806aa06304d9dc4319
-
Filesize
5KB
MD59a169bb66412cd2140169b13d68a3ef6
SHA19a6de1d2f27589ea27fd87f5574c6132f660caad
SHA2569cb1c0d4a38bfa6d0bce8fb7b40468d0ed810e476c2b56cd7fe991e3b73ca4b0
SHA51200b905e5265db0f17f39c603ad24680a8463e33066833cad24801a8cdb0853accda43f8830f6f68985e44134eb2c12bc4a7483d5796fd773d82b82a05776daea
-
Filesize
7KB
MD510a3fe74df8d1dbb583c27cb806b942a
SHA1071b94d69060eb2aca6c2cc180df79f8659145e6
SHA25616fe7c6001b778b81310f47631f72c121d5dc63fec4df6c9d93f63e8901c4d7d
SHA51256b0d9ecb610ddf577d92ae30d76902b2f441c334efa612e60afb5092116e30fea606b6e0b319d6ef0f15eb27b341f18a02f2c2e3d6daefd2d558ec91b286092
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD511d54f6174a1c26beeaf2ef20f5aa864
SHA1570847bb01f7194ff21958535649a6a8a7143b6b
SHA256b6a56079fb513cea63d4fe9c300725a17dc51b3430789e8a5565c2b27e2e2d28
SHA51217da8bd0ebc7b842acd50b45fce97735d26d0d5dc1e48269d49030686c839841699035b6fecaeb9514245f8c5e6431adf11a39e29e2bf0d2637d79a0cb5a2c0d