Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
72cd123168e9ba36f953b1a3918e7e09_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
72cd123168e9ba36f953b1a3918e7e09_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
72cd123168e9ba36f953b1a3918e7e09_JaffaCakes118.html
-
Size
76KB
-
MD5
72cd123168e9ba36f953b1a3918e7e09
-
SHA1
26f17485590db4d153e5be76358ce98c639b534c
-
SHA256
0ee7df1b8a7af5e6807a45cff378f56e1ac5e2775c963c77e8f625294e3af292
-
SHA512
9459d17713bef9762553f8f915fe193ffa045594443cdf2a969383d6200fbc6bc5150afbc2efad010b0ae740f186287b417babbbbf6146a4dcd2bcc1f14ae3b9
-
SSDEEP
1536:SJ+7THGpQW/X3NvAzEyx9pnRpzWu6A+ArF5jwvXnJCmasv3bZi5AEuWMAGO:SUTHGpQW/X9bPbZi6EuWMA7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 4236 msedge.exe 4236 msedge.exe 2524 identity_helper.exe 2524 identity_helper.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4436 4236 msedge.exe 83 PID 4236 wrote to memory of 4436 4236 msedge.exe 83 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1376 4236 msedge.exe 84 PID 4236 wrote to memory of 1412 4236 msedge.exe 85 PID 4236 wrote to memory of 1412 4236 msedge.exe 85 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86 PID 4236 wrote to memory of 1348 4236 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72cd123168e9ba36f953b1a3918e7e09_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,9172583381096143464,5173780832159888199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD58fd7c026fc787478e7d2c964dd9b433e
SHA15f1f84eed7599d916e870349b66fc45c5a4088aa
SHA25643603c64f102872a61c5954c8929855816b4021ed2bf1729bfb9c647fae91289
SHA5124dd76654dd7a8d8416d856adccdc6c7a396340652dd6f7945b22bbccb334d6f7a554023a2152cf15dd5dfbd1e854206808db1cacb663c17ff9a5bf73d840838e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d7d39a44707e2ee47f9efeb345abc4af
SHA160c9449d845aec93af157f3e3e0d56083eeef72b
SHA25696b43894a7d025a95ebfabba9e954e4ae5ab4f785974ac7874c37c03f8023618
SHA512d99bbadb54fdcd6765bcfe485804b4d0a16bbe0254d31cb7a4e69112b7589b61c1439841c1905bb260c069b86ef1770e40df7305d0ced2e741016fda33481c97
-
Filesize
1KB
MD513a3eb93f88070c00463f4dacbc9fb0f
SHA10a1372abf36d0c6d76f3a0f59f57432e04a622bf
SHA256dda081345ad71eb7e3fa0675aadc30a0c506bee2efdc6e4728ed26ecfcd4a68e
SHA5127cca0088aa0b012e77a128be19b3306ec253288eca220b2b1ab465e6a62d32c1dbf238731025c9d0f7c409166458f61147687ff72f5c8d6ad665ceb9ba615f82
-
Filesize
5KB
MD5e4529d49e6c1c73b8744b7a988f0f366
SHA1afdad9bd36145e80b5e02185740caaae23adf1da
SHA2567e5a8ccfffaaee7e01e361ec1270b0f6e1d8122e813802da549bae670981bc5e
SHA512aa5f26d3e762b9bbabd7f75d7deb93c5f4828fff45c5785accf875005cee5a8bd9dc4cd434edfcc95228209f4fa873d7de1326f58ab7878324991459bfd64236
-
Filesize
7KB
MD548dd705d531e1f18307b1867d8431802
SHA13ade6e525f91e83b06c00928591f673ce25335ca
SHA256b2c407c4947c190e4af0bb1833cfd7b37730fd4fc04fa286f1d2a4f4c1226984
SHA512c8e78ba585a4d24aa0bfc79454e81cdb98d5bc116720957a1be8c87b1aac41a0d0650a6f91ec5836120349c2d565f806858e58bb20f988cf076f04045229c972
-
Filesize
7KB
MD516f563951d07f13b5e1220835ac7a6a9
SHA11634c38ad2ababcecfb35b01b1049207e8ad6109
SHA256ed53056ef82e41195c00c7ee0800afb5ee991afb4cafe117fada6433fe7cbe9f
SHA5122b372f5b1705e17bc676600b2b25069cc037fb3bd2f5c49ad766976c627d8ec3465360b81a829849493b729cc7e7529582221cdcd0cd3cac618fc2dc80bede4f
-
Filesize
7KB
MD53dc24812c9278030626878b59250c174
SHA188c9593651aa9cf3267d42694df9978daa20e3b1
SHA2561c170e841592037dd04f9435785cf9fc3f5d585c2af97f2a5adbbd63b228d111
SHA5127670ff1dda3acba6093ad584b726e6562259020a569e4333947f927d09511e9d0d8a135d75107a183e8ace7386e6481cb67e4f0beb37596aa8e5381b69447c61
-
Filesize
707B
MD5bbe6ca903882e62c8c69eb8ec795550f
SHA16cfb010918f6fef6d15ec351bffa7eb174489f98
SHA25645810aa0066152c08086fe9160ab1004e3223e7b8c071e88dec2b3992831feea
SHA51277f9aef9bed88f56e9a35fb507ce1b60aef63d008a9fb4a1b7d53fee31974779cfae4f066ada94eadfc9b848615413f388d969cd3bb98c6f1e6194546ebf8313
-
Filesize
539B
MD5884f0df58d193ad904ccc5106e405ff9
SHA1a5cda95f8a83dfb4b1a229dea290c74808b731a2
SHA256e0f2ab9b8db49a63a0c18a561d138d4aceeb252e177a7883a7a5aae2ed13fb03
SHA51225fc77cccd3c166264166af7e62c8140db0fb3189f4a355196949049b8679b9472d8e44b997d7ca5ae3282f0117c953529be864c7965feccf4aab68e769c4fee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD508e679b26cadc0dfa3fa7e576652c17a
SHA1d41ea8940fb4a1dccc900dcc09b3ce8b4561fb70
SHA25657121556c5c3d0f7a067054d880fe6d3cc27b5e6811e804737e7a5f638064d3f
SHA512c351ef99c847b24734862a647afab1dbd27fc91b2e878697ed189217ed4406f8caa64398b23208655b98af50bc2cb57e38cf4a924deb6426348d450656129fb6