Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
8def43570730f4ee99c41f5e416fab8b_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8def43570730f4ee99c41f5e416fab8b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8def43570730f4ee99c41f5e416fab8b_JaffaCakes118.html
-
Size
30KB
-
MD5
8def43570730f4ee99c41f5e416fab8b
-
SHA1
0a90bdf5382d4d998658a5fa666dcd970debadc1
-
SHA256
8823c99ef98cad115c4025d31d5d24d04c73d79011eafdaddfe5ac1bee87484f
-
SHA512
04a07057d9c3bb242e7cd9e34bd9f368a46b3186e0e6aea6ed0563ce60b8e1de599690b70a4917bfa0ec767d1e812a9c6c5a58977f2b169fb8573164f519b2a5
-
SSDEEP
768:8mvXvV6qqlVO7Vdnujx9JKo7zFu4LYoOmjWDupIH+Y/tfT:8mvXvV1qlVO7Vdnujx9Yo7zFu4LFOmjq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3204 msedge.exe 3204 msedge.exe 4164 identity_helper.exe 4164 identity_helper.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 5024 3204 msedge.exe 81 PID 3204 wrote to memory of 5024 3204 msedge.exe 81 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 4612 3204 msedge.exe 82 PID 3204 wrote to memory of 3480 3204 msedge.exe 83 PID 3204 wrote to memory of 3480 3204 msedge.exe 83 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84 PID 3204 wrote to memory of 4412 3204 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8def43570730f4ee99c41f5e416fab8b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4ec546f8,0x7ffc4ec54708,0x7ffc4ec547182⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1312 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1316 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,18429932954189939834,16301283069483740584,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD51bae6d6a80bf7f603e1fe7cfc90e37cd
SHA10a560da60422f85e77ad27690853e62664288d2e
SHA2566eb549d2a4b7b670c4dfa29df91339ac94e6f70b7fbdd63e977797b2631ca03c
SHA5121f611a80f2e6aa2a67e3ab51f3c81bb2c7ffde29fdcbebe88ff447f2f232cb5d547f1707cc61413da49e031defbe9ac29d811f9d0a2af58431397f6700b86f57
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD52c0219dd86bba8a1cbcdb0b0fed641e2
SHA1d2869b7e2164142fa452ea11bfe582b1e4e71e13
SHA2561dd9d4e4b482e33b6937eab5746e8d02710c0cb81619126890b85586b66106c8
SHA512d016473da90ceb165d571cebba6cfb3e64a490dbaf5bdb786def3f0e107c5a486ab13bcbbbc87751a4eb7099134061ae8bef7984eab4868dbfc886c31ae0e2b5
-
Filesize
5KB
MD50dced574d3a5af4e4f9063fe0b615b49
SHA1e7813bc2e0686f577f461388c770cd11ae9b6f02
SHA256232d2571277a33c39e14f779206e90132b2d8969d0a71fde9116d464165929ed
SHA512f4367cc74bcce2b642f82ccdd6d6cd6dc6a952903df70f2bdfea5a29f36c6e13fbefb4969c3aeb3547af62a373355bd7d6f8e9f14dcc9edcabfd6c431f2ed52a
-
Filesize
1KB
MD5ca8393ce393f0c93afce4f9c63544fec
SHA107e54463c92aacdb3a21e9b7833e323788bba3e9
SHA25698ba46f7c9224f6d53911568b805263816d28f9e95eb076d576a3efe1dae7a8c
SHA5127e87e60ec3fbf66dc7eb315ade23d5379fc579cfb38e0e6b6952e048e71c6bc5c1e8cfe695247a245ecf27db05f9cf7f6696391a092331540732ce6a230a3bc4
-
Filesize
1KB
MD5e02b8f118480c92c020f2a8f57237642
SHA143ef3748cd1f943fb25d4fb9f14fb2f1da7e9e93
SHA2569b45968fca0d7ba10c07fcccf52a728b0bba0f87dea6520fb6d51ac39fe3b416
SHA512dd8e88c05ecd81ee15f3cb9bed6986b47445f72a50bb2a8184a06f89216608a8a63085e6efd93c9e4945fc7b2969fb52cb5d9c55ced9a2565905f2e86b43df7c
-
Filesize
703B
MD55f6f72332a2b35315d3c441feb4f6dc9
SHA17b39899db432f596f1811c264f0ae59823be6fb5
SHA256145984f6bd3f676fc8d8a385afaadf9fe7413202b453e36fb4c7720b5871c53d
SHA512b40a948c0468b6ddc058f2871bb97bd8b6a370fbb6638722d83fb79872e35a3f86b6e77cb577a0d07f187c3d64e23d268418c3b799ec1bfd10a842796f156167
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d26cac6f-9ddc-47fc-b681-c1d69d20efae.tmp
Filesize7KB
MD5ba75b9d854d92df3be8e9975af668106
SHA118f2ccf10023bab713aeb8706c76fce64720874c
SHA25641a7c19996e165aba91f295527b5fb4a4b4b63dfc5175d3033526e11b81826ad
SHA512e10501fc7682262ed3e6c761c21724651794e4d9cbe679b07e7f8df36afa28bb460a5f33fb61849adc209167aa6aafbf76e44dafc6842d6a5e517e984e3514f2
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD553cc60339ea4aee1536bb47ce6964756
SHA1fd57cb9d06301081fe799d93e598da58b77494c5
SHA2563c6dc64e2d6177d0f24f724e58d127393f55df28233571708f2c52e255c95be5
SHA5122c9254b60b79b3f6509ac232d18a376f7f842dcd151303d02fe4b970cdad209ae04b4612b136abb8d9a112eee15905355d7cd6a95b978dbcee1421ec34d130f6