Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
61b31244cea720a570a58ca059b26900_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61b31244cea720a570a58ca059b26900_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
61b31244cea720a570a58ca059b26900_JaffaCakes118.html
-
Size
76KB
-
MD5
61b31244cea720a570a58ca059b26900
-
SHA1
012059ec8849b1bd0200424f47a67033edc0d2ea
-
SHA256
dce483796efb07cf1a359e0dea635cd813dad17a0bc03add997ba13f235f172f
-
SHA512
22699668d04223b5d8b68a8bb593a2fd3cccc9e0e7497c9c6676d75db493aa846427a0520e9ee0d05034dcd55e9b0e87f1c66dce3fd21d73b38eecbe46123995
-
SSDEEP
1536:bal2M4ClrlLRVtKKe3fwDR68Eq/nNHNhNxqrBqbgQuMYLoTUMSR1Lk/NaYEyb/a7:b22M4ClTVtKKe3fwDw9q/I1yb/axVcts
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4864 msedge.exe 4864 msedge.exe 784 identity_helper.exe 784 identity_helper.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 936 4864 msedge.exe 83 PID 4864 wrote to memory of 936 4864 msedge.exe 83 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 2608 4864 msedge.exe 84 PID 4864 wrote to memory of 4132 4864 msedge.exe 85 PID 4864 wrote to memory of 4132 4864 msedge.exe 85 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86 PID 4864 wrote to memory of 400 4864 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\61b31244cea720a570a58ca059b26900_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956ee46f8,0x7ff956ee4708,0x7ff956ee47182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9025900911406875247,8151965737450241381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5444 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5c594ba2f342f780084cada1bcabd9a9a
SHA1471a43e528ca8295705ff24a2cadc2996b78859d
SHA256f668e8010e7f14c17695cda28e37a91f266adc101a03fde799d706ccecf12b81
SHA512fc7c89f3fd2d47a87923ef66af6e1e8f9f913e8029e2a7c1709c3116fedd286d34e5a72102eb72237e77b07313d341be076b46676bc72999bf9edf91c20739c0
-
Filesize
1KB
MD542b0e68ab9055d5253e2e99a7d2d7a55
SHA1a32307546b93109215957377806461204414cd88
SHA256d7499e2c7edacc8f3b4d665437829b1b925aad9a3353df8d721c3405c3de2523
SHA51290ce23cc3165da2814cac31ae7fbd280ea0141310b4d4d20d34a8fad032b7d4f8c3a2c2d03217d6aaf716053f1410573f797545d863fddbc0a1813618420ad59
-
Filesize
5KB
MD5f6b24b178368691c99127ca86650f555
SHA1ec078b2421d99e8f2bfd8a6ace468521467ed179
SHA256cafc405ad50ad5656a6c8f54fedc54e2fa69891a614d6d1e9fa02401e6e70f97
SHA5125a43adc50bbf6e3811b087cee60330293e314a0345f3090ea745df12112161383f7dc944d4b9c1753a5e2ab16e20c5d52858d9ce641d320c9d7db6ad08095273
-
Filesize
7KB
MD59565499f339383f05c8ac4380d5fc79a
SHA132c821de4dce77a99c6928f5ea8415f6e3fa0446
SHA256754c2387030fd14be86b2579b4614775867001c92bfe790492b8b41420f11137
SHA512d8d0f7d6f831f05af1a814681664697286df341db8eb6c1b14d0f4c1499242c299c5f4657d2f5b98d9e33e87ba35c2e2812302e5d3d611b82c0c759099d0e2be
-
Filesize
539B
MD5737e0ffde72c1207ca34bce18aa09293
SHA1e6a9ca8d71290434a25f64d7b29321b96f09747a
SHA256090a80e3ea87251997b60d352b01bed2200c0d4c3d7ec1e6140c8a62f9c449ff
SHA51261ca4c4fa2797d866a05bd6297c70b92e671852ff0085beba449892daaf1077ad880548c11a52e8cb32242527144bd039a4960bc51c0c8e59fb6abf78355d787
-
Filesize
539B
MD5353eb37b6b989780233043ae3fc3986a
SHA1e9ee1bdc9ec825d254351a34b5be32dba013b8cf
SHA256d3d003b4ec036fcd04fd29bbc6c31dfaf096f079622779609544f9b7fefbc143
SHA512fe85af82e1ec1d820aeedcb0436afbc4f64466c51701f7e1b51b8c1f54836697cb8308e0a24865f20e3b095a9194ad603baf6b10aaf8a8a632550033d96e589b
-
Filesize
539B
MD55b7618117c3027e566406daaa4f65dca
SHA1b5c48d08ade917f54f13fc6e3d963862b05ec9ff
SHA256f010740ce1deeeeebc0f5eb14214776dcbbd9aed28ed93858e0d825a3488a967
SHA5124280a0be24d377496272dcc8e9bb9d8ebc5cba60714eb7374ef55a8cfb96680a40010248cd75626a478c5e14d28bbac9581bd094579d70c6e7f9c19b13883ff6
-
Filesize
539B
MD5c5c520b4317b3b57d777ef09421e21b9
SHA1001188ba490d0ee57cfbea260593562f56210dca
SHA25614f4e155291f17f5c65e03b8bea16ab57d1da1e3b733c3e158d6f3109a7a8db3
SHA512aa1373939f6e0aa27e213bf22a345e0b0becb29450caab906486d16e76c8f3269b6a86385b9fa27f81c36c6597478577c069e3a5cc7af6fcb87bfedf365e3e0e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5760850b335e38dff4e65099c30d80f35
SHA106e9f51ef9efc892e32c3228f5bb9cc8fc91f4cf
SHA256f0a1f766cffc0321a09aef44910eb38190edadbab4a71598c12098219ffc4713
SHA51285b44489118ceeca127d55ebb297290cfff3b86ae9aa0d3b3be2670737a8468ac780846a52cf18cb9bd0c9627ff56b8eee29731ade04d93fdbf321c3de19b8a3