Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
689900c54be55db8724507389dc0d8d8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
689900c54be55db8724507389dc0d8d8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
689900c54be55db8724507389dc0d8d8_JaffaCakes118.html
-
Size
63KB
-
MD5
689900c54be55db8724507389dc0d8d8
-
SHA1
36ca5eedd4740799c033b0e0c043e0e583c0a0c1
-
SHA256
b6244fcc372f7eabb4800b06ddaf4927e787e219a3ffa5f78e89023444bb8d37
-
SHA512
dde21c379e3a50fa02f8f75472dff27158c39d68d8e035fd3cbcbf747dff790cbcc4e44dfd1ac3451c55a8eebb7e70cc257465818839b119351ec5f6e8d89ee3
-
SSDEEP
768:nUidqi714wbZDOC2aOKWS+SCyWO6am+wGesViVDK5ECuur04XaEY9CinUYZxA:U4q+1rbZMAV4GruupPiJPA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3012 msedge.exe 3012 msedge.exe 4424 msedge.exe 4424 msedge.exe 3048 identity_helper.exe 3048 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1648 4424 msedge.exe 82 PID 4424 wrote to memory of 1648 4424 msedge.exe 82 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 2112 4424 msedge.exe 83 PID 4424 wrote to memory of 3012 4424 msedge.exe 84 PID 4424 wrote to memory of 3012 4424 msedge.exe 84 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85 PID 4424 wrote to memory of 2456 4424 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\689900c54be55db8724507389dc0d8d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e2546f8,0x7ffd7e254708,0x7ffd7e2547182⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1592 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,14458610165937577488,1644887412933931024,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5993fa5a48790007b08a06e77f5577409
SHA12bd7451e59a191b52e370156cc27f56612121fe1
SHA256e10747fefba7a910952f3cd0bbc16e01767275c6360df9201b9f9e6af59c214c
SHA512e1445c95340891481aef7dffe5e7519c1fa6a6988adc59c3bf5c83eb9f5d17dfe13b2020d790b8c5d92483d0b835fea29d45ae13c7e633e0b10d39c8060c17a2
-
Filesize
2KB
MD52b100df48bd9a6d916437db611e7e78f
SHA11f39ca3bd6bb17453eda597d7d6f7a8d4cec6481
SHA256230eb1efc1be83d172819fa84cb86cc020b862e3d46abfd85b438686c39aab11
SHA512792cec47798fd8435c7429f6af22ca73f6fb1dc891d6db2746a5522f4abbefd00998e892c61b503431bc0fe4a435dab73f6d492fc1a111fe7abbf63a941f9c4e
-
Filesize
2KB
MD58ff41b768e8e9d79c0f573b4e5c90cfe
SHA19bcb0f7c0cbd05e7a11dff12e7fe01db4aabfac0
SHA25603fe2fe480e6aeb1f9c81cb55c28c70c6575a2474d96b43c30b88782f674c857
SHA5125567eaf6ee9e8c684451abeb100454c221788b124019e43dcb7077b6e60186d7189003f3895949afdd9bfd3800996ccd079e73d19f85bae78fea0dcc3f83ede4
-
Filesize
6KB
MD5c6a751d70d91165eb165823407bc0859
SHA12729650eda1906eb77423337db60ec158ede7375
SHA256a886cf9818ccbe49d373b9a6f621973109b6dbe68d51d976ca4bbd82b2c00882
SHA51230efd8ab96be07f7afbccf22ec418a166c884c016a635efa4c882cc7befa14760ebf9dc4cae4c4b4276f1d50aa75029457416f22e8194d07ec96a9f27695dc9c
-
Filesize
5KB
MD526a59dbd1ed546c7f88a5a04417c16b3
SHA142dcae73860d617475ade071e08265f964f51e9d
SHA25625114b96290adf8588a1127dab979f8f7c1d187290d9a6d7771c05afb8f72aa2
SHA51286b143927e4d5870129869d84a5bc2b54b8c8ae30edc28a7983c2b6376763237d4cacb874c724dbc9eca27f89e7070aee88ebe88be2828deb383a83754350265
-
Filesize
6KB
MD58f9066aaac30f915370592300cd58bc9
SHA15f1ac223c69b96e7e05621e80d317ac2bfef1fda
SHA25634d3e28d45cb0152cf8edf365c3718aa1e73c3a3f4dd3cb161e2aedd39a55c6b
SHA51219102435b7024106302b54260f3d125ea8ca686a80a936d6fe2094944b2a95bb1e3667a88a35daa58213e9d35ae42118b802dc501af50689b1a1e46bc4aeb0c9
-
Filesize
1KB
MD5ba16da30b37715f14ff41cdc42a17b8c
SHA17ceee0c3b090f91b20c9294e2e1d6b5bcd18a790
SHA2565d9a1a8c0038bfa0c75d760b0b0bb5e4546025a335c43a669ac231a9d18f6975
SHA5123a68304b54247f294115a425ccb4edcc2ce70d32211bc682ba1b03150f71e04589a2f3ce56817c95bb6d28f13644544becd427aac91109a85014416d592d6960
-
Filesize
203B
MD5ea8b11a1a93a6dd14e6a549ecbca5993
SHA16dfa8f97b7a1913d83a09fef8eaa3b2f04aa9188
SHA25615df061150a036f534f221c7aa1944893c01b327ab6567d83df3fd8781775f6c
SHA512ab6c964d5ac2a4f71b64a93c585db5102429762ce1bf1b4ad542bc15ed72e3a8b4ad050c56cf98cceb439b3dae726500139a86929b8608aba3f4972f71ffdcb6
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5190a3394f3fa0ac0733a607e3ce0458a
SHA143ea3d820a132d2729da7520f7c2a798506aa5dc
SHA2567e71f65c8aaf87fb88ab5d345d5c58cc17dd5867b9772cdb845ea81bc3ac1987
SHA51297e58cb86dad1b0708c04639d0f9fcb450bc4cdc7a01a4f60e952978c2ee44a59dfbde264d89630070440ae9ff5c11d24b4a510df861e9e01fbcfa2bee99e808
-
Filesize
11KB
MD5beb757af30005344cf4fdc64c8d45c47
SHA1ca6f44dd71f45348941337a8c11488e98b96c637
SHA256a305ef17c3873a6ccbd3e12966d24c9fc925a90692ffe25994260a4c3c097e43
SHA512b8fb3b38db908d50e88a57a69c5d12d41aa2722e18494d3d6fb3fda47509889e57c67bb9ed458af765427591241e645a90c3f3966d38edc01e954b5b66dc3675