Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
44cb0226d6e93c858e9952bf6d1c4669_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
44cb0226d6e93c858e9952bf6d1c4669_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44cb0226d6e93c858e9952bf6d1c4669_JaffaCakes118.html
-
Size
149KB
-
MD5
44cb0226d6e93c858e9952bf6d1c4669
-
SHA1
eba5314e3def03ef4f17860b6771dd1c63edcb0d
-
SHA256
2b6eb110ec48f42939a301bff255a1c8f202fac27fb1c4114028c037684be534
-
SHA512
36152fbbd29707c087131d406d3c5513c2f924f1adaedda1e183e09e38f841dc8203b6987c01f7821480dda1f1db1b5ad3af4e21df254c8697b92ad1a01a63e9
-
SSDEEP
3072:3seivTCbNPa3up6v+KAxLyHHJqhEqUZWrYzA+Bp4vcsgZRlXMGW4jPjqGk40DdX3:3XbN/p6v1AxLqwEnZWczAHksgZRlXMGS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 332 msedge.exe 332 msedge.exe 4672 identity_helper.exe 4672 identity_helper.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe 2316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 332 wrote to memory of 2200 332 msedge.exe 84 PID 332 wrote to memory of 2200 332 msedge.exe 84 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 1948 332 msedge.exe 85 PID 332 wrote to memory of 2144 332 msedge.exe 86 PID 332 wrote to memory of 2144 332 msedge.exe 86 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87 PID 332 wrote to memory of 3992 332 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44cb0226d6e93c858e9952bf6d1c4669_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa302e46f8,0x7ffa302e4708,0x7ffa302e47182⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6940 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1744 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9369181211356947469,2941864121880877868,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5399e1253486e22bf1396e324a0cc89e7
SHA13336c6c61b0c4fd4ac771a6a71b9c8e258815dba
SHA256b34ca5ca3cef5bb90d7242e712ae6e706b89c87c07a4bb0800e2c560df3040e0
SHA512eb6325b5e364b37a95e0f553a09647c4ecc64458f5808c94eb811a50f9068ca15d7cd9d1486d06dc1f9eff3115533600980ec9537dd7396dda5b94cec4057f12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5b9b04c9d9ed01ca01bfe45a0aebf08f3
SHA1274f849f995375dae1b3f49bb0f3b2a4c6f35115
SHA256ea732de247cd9fa7444c5c62001acc43722c108ce7a5ea2c0216fae5576c4dca
SHA5125af4c2f94909f29a108bf7066d234a370a3c8b82ac3119a9fa222cc89ea3fb74dae06b3624f29fc3e28e337c6074b3c67fa5a94aa3aeac7c3e4c846c1d3203fc
-
Filesize
2KB
MD5b979874d4c61db8593e3fa70e35b5bc0
SHA172968f66b9ee3ca4f9b454b94169fd971183315e
SHA2564fd732025ab4fd84f36f91bd4a13da29c4c967d997db10af669bc84503964ba8
SHA5120670d5644501e97b628f022082e17fd0e5ebdb0120ac3526a9cd0d09a29581379255fd64823d2e84764b9f4d567d3934a1ceb62e9016fd872c85e88c0f05ad9a
-
Filesize
3KB
MD5e2d5f97e209af203e44febbccd25ccb3
SHA1f072b74b9b2b69c8faaffbf002c2db2739dcab61
SHA2561ea76e672f0fc761e217a0b1ddc47b024ac278a9f23308403d05cf2851e036f1
SHA5126e0c987ef9c73b11a3339797cf647775a6252912a7f39189665e4b711fa063fae6630f59ca7b2a88cb3ce030101ad40bb1999e3b00c5783da8150c9efbcb01ac
-
Filesize
6KB
MD545f7d53395b687e047e8f91a23577fed
SHA1b6b46a90cfea6a6822ec03b49ddb81ff1cfc3103
SHA256cbf17ddebe59981c2d7930f55ecf3c90c332ee2a4328e90fd5f356cbcf3bc82b
SHA512ba155cb5afaa7a9ffed66a7a92126507747c52ae811ce2c2562db752894b6fa5783a75676784711eca3226b144f12b0b163b54bbb16512470b146f94b9d7d762
-
Filesize
7KB
MD566b51f6af9a28e0e9fccea05c14134b2
SHA1aafae34d08a67d23eb9e32ed61a1f5b2ba0b70a9
SHA2566d36b10b588dab1cf509ed6fb881d110119bc3bebf6d41ff2db6ead84c6241ef
SHA5128de9c96aed7a5fb8e5137fcf1cf75f1ffb56a08f94a341339a618445cad9be54fcc872bf5f99b75158e984010aa4d0b59197a23c526c0b25f4e8d9b1478ca95e
-
Filesize
6KB
MD512a1f665de6734255de8ca4a90ade478
SHA13664ff211efe672bcb31d6bb8ba44e3ca9456763
SHA25640a9328b03aabf23ef8918da4adad72a6338d819265b9e167aa8b9665845267b
SHA512e3b89c12f33471cee613810a27e329298a16217dbce62e82016f1cbbc14f6beac557ea7f9bbaedd23b390104b622a941a98a6d75abb0c492786805fe4ce0b6ec
-
Filesize
707B
MD5de56bc3af2b14fdc520dc7b2a41f1a06
SHA1e210630ea7837d72fccafaf92de546db552006a3
SHA256d399325d5ee816502374c3df1415ba125a1c8cd98a9feb487057a00640ef0f2f
SHA512cc2d16ff3d54711c89055c84718f4e7db9071367b76b9e420ea97d4aad4f1b2d9176aa72937c0e5bb614692dde0e9729822b76eebb40b914e204e4afc9e57b33
-
Filesize
204B
MD5776ca974b0a2d2114cad9ba8629b4347
SHA1e9c354e765ad7c0b770857994c1e3f3d6f7c0bd2
SHA256db65ecd037dcdcdb6fb916eeca684afb4a0457d1302f2564af09f3bd91c47abf
SHA5121522adcc424ff10b42bfce0004480cc4186932171cefbd693fae361a0a6c978d94dff678e5bfc74a5327c28be29cf32f27370b9f95bbf91c4681913c39499d26
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c2173893b31522b56d25ececfbeb6daf
SHA10c70c5aab1189a68fbde96c30904cb0e8a2f2237
SHA25686351b58ceef9d5b32a3a5b78cd2a2df962147342fbdf8eae3c3dc3cfcd23127
SHA512ab8eb3c8845a3aa830c40dd05c9dc5bcfd97ed792e444e43aee2133ab08318c8a612a36cd55b8c22621abf6f4b70eec6c39f66232b180c196c7fce91f3600022