Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
95cad1c514ef4e6334c40fe5c1b07bca_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95cad1c514ef4e6334c40fe5c1b07bca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95cad1c514ef4e6334c40fe5c1b07bca_JaffaCakes118.html
-
Size
74KB
-
MD5
95cad1c514ef4e6334c40fe5c1b07bca
-
SHA1
9ddf151ddf0a032ceb598cecc3d8066214340567
-
SHA256
035871db32e2e6489b252e9e75f854ec97a7469e88eb7204436f67d2bde29e4f
-
SHA512
6755445ab9b51dcb5febd200639163675931f359013e93c6a33bb40ac79ee84f88d0ebbdf7c7867a9f1b24239b6201333e64b460b5e26211728ab27ebfaf6a0f
-
SSDEEP
1536:b5eQhUJqEPY905TTrNsbwL6gDreC38z7lEJ49Sr9QZNC8Gy8+bTm1ytcPWjBN1m4:bYQu02Y9iTT56gF38z7lEJ48r9QZNC8R
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 sites.google.com 39 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 908 msedge.exe 908 msedge.exe 4856 msedge.exe 4856 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4856 wrote to memory of 3956 4856 msedge.exe 82 PID 4856 wrote to memory of 3956 4856 msedge.exe 82 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 2892 4856 msedge.exe 83 PID 4856 wrote to memory of 908 4856 msedge.exe 84 PID 4856 wrote to memory of 908 4856 msedge.exe 84 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85 PID 4856 wrote to memory of 3108 4856 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95cad1c514ef4e6334c40fe5c1b07bca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc763c46f8,0x7ffc763c4708,0x7ffc763c47182⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3096 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16616182335917867938,12227691309200646528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD56987df270e925818cfa1f687868ec6e0
SHA17b053403b458b777efdeaabd7c913b5c9e1a3032
SHA256a7d6375705348f146dee17cd700ed683b55a0a8341befc7de01b538f6fda0bc8
SHA512e506f1a2b33552243c38811fd8480a833cbec90e3e0369b6fda406eec1906011bff566f433f8cc4d77efae477e547e5f718ef763348daf3f1064173f5ca8ff86
-
Filesize
3KB
MD55e4b355da35c6d4326221867bece5f4c
SHA1a5115333a8dfd0ff5e36dce1e484982650d46cd4
SHA256ff523338e77de688c2887d47d497b017c06567152b3ba6d29c791c4aaf1fdaf5
SHA512b0d37b26bee4e6757e8d8962da2057ac2c5de1f294f81f31192ef1efe7835c7ef0cfb8baca000d4a1a644d4341dff9aa2fab0784fcc1e6c349f6133540259f6c
-
Filesize
3KB
MD53f8067e07e69e0d3949c28c66dd46ae8
SHA14be4b53fa2765aecbf7064f8a49eb7b875ab23ac
SHA25618f69a0cf22da995e2e8c190ba39f39d49485483a80bd79875da270da8891ecf
SHA512feda5ecead33f10e80516857dd0acea35f1b4bd771a5243209a0f8188ada7bc1db48516edd215d55895ff7de7b751280e1e8fe3346cd0cc5fda45efc9ce9a06f
-
Filesize
7KB
MD5ac808141be0a86090872c5c758208b9f
SHA1ce574188b84cc78c778ecff23b0b3bda1b233cfb
SHA25628e6d8d1941314c4bb676ac0d97ed3dcec5e578a9d0d716c17d664aa160beb90
SHA5121e6037dc3d3ee51a4674e6b8840273de14a4ade568ec54699b9266fe344f90562eb47c81995704275b1942b295ca67213ea405e72007dc633127479a2a63fcb4
-
Filesize
5KB
MD5dc42bac1ef7c194579f7f08a6eca3e70
SHA14db5d7144ed78a83bf3dc57b063043f34b4546d3
SHA256fdb3f232486997e4ba193e1a168ffc9d1b37d7daac804e0ee76e25259434ab65
SHA5129e116deb79a0d8dda22553521bb8b9a16a002f1131e7aded3012c71db4345abeab9411d8c2c40c2872f45bd2006a882907096b58c648f63a37aec0af18651ae0
-
Filesize
7KB
MD52ac2d653c4d593a1f07446322779eb6f
SHA1a0e2469554dd4f8e17330f9bff6e0de57baa5aa6
SHA256afeed7aa14b5d94791a4acb3c3ea326eae632096b601471f5e59c86586f01f68
SHA512328dff27b7b640c6ef18a095e34ba82e4473eb8f04e2a094f4ac3be3b74d2ddb1da43480b9f75200af8a7bebd8eb9582811c5a18e5df0339b80309502194ab46
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5647958020c6c215cd3217db9fa08b3da
SHA1723644509f87d41ff171e7e74bbf2a36d176a911
SHA256ee1b6bd15478bd95553a7ab9695811bfe2af8294a6ab2e32a53ae24f5d703145
SHA512cee85abe696a0fa40a9fe43362c254c286ba43aec884f75ff5134391d57128f7c0c0bfb51af64788013c015fc323e2c09901264c4502a25459c920acfcbd33b1