Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
0af0057808751b79db05a91b18de9d9a_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0af0057808751b79db05a91b18de9d9a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0af0057808751b79db05a91b18de9d9a_JaffaCakes118.html
-
Size
56KB
-
MD5
0af0057808751b79db05a91b18de9d9a
-
SHA1
aaa69193d61e9a4bb0d662bf8bffe4863bb42b49
-
SHA256
13a94a4df4cd35d547317240364f1fbea28e51f26eab86958f870402253bf0ce
-
SHA512
ef096cde21c7ab84e6695440b55d196db6d8af295cb5348ec6bdd6c5982776d390903daabb353c73834724cfd6b3323fb4da256f318c21cbabf123facf1ad093
-
SSDEEP
768:weT0EipBJYXmQqcXTGOcHegypn55CKOAVoxWEjzVOb+g+Nh:nTupBJYX1XTGOqegA55wA63Vh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 3464 msedge.exe 3464 msedge.exe 3296 identity_helper.exe 3296 identity_helper.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe 3008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 2632 3464 msedge.exe 83 PID 3464 wrote to memory of 2632 3464 msedge.exe 83 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 1092 3464 msedge.exe 84 PID 3464 wrote to memory of 5052 3464 msedge.exe 85 PID 3464 wrote to memory of 5052 3464 msedge.exe 85 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86 PID 3464 wrote to memory of 1528 3464 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0af0057808751b79db05a91b18de9d9a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffabfa46f8,0x7fffabfa4708,0x7fffabfa47182⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7064 /prefetch:82⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13027601658784925137,18309246944665349370,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5ab46593e8c62cb66dd3b62d8cbef4c27
SHA1aa46fb5e999678351bf1b2f546f39746f7ecd53a
SHA256aabd80aa8851a90707a376ae0b50eaf7e348a019fb8fd1a6610d2c75485baa62
SHA512b6e800320c43787e47215bdf03a6f4646d97247150a72686e87f2816b9d71946e138ebd45d264c702f4b3a6e3f2da880a1664b76e604df5bd5dc7e6695241fcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD510319d90c9675785e83b7abd6f71c9a8
SHA100e1818c80e4d07d11f1283b3884e86caad953e8
SHA2564b00aacb9c5cac592a422865a8befc818d65e874baa282f37d4a8b7eaec87311
SHA51283cb37e1a0bfe9c41ae56b94bce633a5ba342f03a2b60530d8eb4d717ed361172cf79c743f1a9581d4192f01358f204f96a64ff2bd9477dec47d453bdf14828e
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD54d9fa043a25330cef5ea5144f1c9082e
SHA1d43c1dc37fe78fe51fba186b940209b1f88dda03
SHA2565cb3de39bd9bd83f3cae5064ea45c57e976b692037692eab358906718e1be0ed
SHA512b18a2c563b82efb787ee48eaa0de1c56dfc36f2d0bf8f80fdcc6cc333d9127d0b906156173309935163b3a5d4562cd5f89aaeb6d98acb09c0658d21e6f6e14ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD50395733a8100ac9ae9b78b57895c26d7
SHA1df97c34663f8eae7d91f02cc177ca6660dcd4bb7
SHA256a47af1c73e39e76d8a17e6138f0fba1d9d5a0cc7b34d02f111f8a0000a115b5e
SHA5123cf61fd640f4dae77ae8b659422e52b7157f3247b64d15e3ad0b8aae59c604715f4d1cf27ab05ddcdd79bbb486154c49172681415a9723723eb7505a3a733db5
-
Filesize
2KB
MD5acfea0ab5a623b8e0de860bc5624263f
SHA1a7a6bde195e71f1e644af28c256a65949762c176
SHA2569ae72c6dd497251f35916a5a0e0a8b84751621a9f788abf6f8007a0fda207253
SHA5120a39eb65c4a39a864de478f8ae862dd733c1b33b010bca9824c420241a084f6c481fdd7bfe14b38c61ab1d7ee24002f0984dce97ffeb5b0d5f00e0f28a015fbe
-
Filesize
2KB
MD5c9b0a8d8eaa230c4df17f3a82ac5a717
SHA10c8752a6ba4be30c0dafecd6f5b0ac7681382cff
SHA2569ba291e578bb8fb085696c32bc8a82397fdf765df69e04d5ae65bf60fafa8349
SHA5127611324c2e952d374951a071c5fe50082d66efc301ba81cc546691da5a436aec56b1038f79de4f7c15de2b4e45d79358b38d83666c118620a672c77239804c27
-
Filesize
7KB
MD567476cc8a207dab7f75187b2c11768ba
SHA17797fc2ae07a953aba3f82ad6c9da80b28ab9f00
SHA2569267dcfd1213a32e46c1eee199bfe2d1241655c0d6a8ba9b2880951094ed3bf0
SHA512ddacd90460d36232d22e85fff1c1e9efeee1e57dbe0b14aa78ab9f3ae0af2f12bf778ba7461654f5616a333735dae0a53f7ba64178f46989126cae577f817456
-
Filesize
7KB
MD5a0ecc253c4900fd41958a4230b6c930a
SHA1ae63cc51bfac422e6c3321c4177de8c2f18dad14
SHA256d12643e158f9a58dbbc89d56d36e6dd2890b5eb952ee3043b265938f5c7f5cf2
SHA5124153a2bd04e48932e08e74c2d88830925acf4db24d23849b4e75f0dac245aa8d16f6f39838f229dc902e274a46e1385451e0b3823e74ffa6de1d97ba3d2413a9
-
Filesize
6KB
MD50967c9f4e1fb88aae6a41babfdf2bc13
SHA10877e44e788b85e342d5af8cfe4875582abd53c0
SHA256ada6b512969b279216b051728cf9cf75073306534821bc39c862c0a277b4b52d
SHA512726cf375a8290b02ecbdbe1e4452c985394149b4043463cf34ecdf25d18faef7f87394286bef2c9790fea0786d76679b115433ce1999fd2f0a102f70780a9965
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50013e8353d9287a0a884b9b1d79e871f
SHA15663f06f2dff60628437983f935b30df2179d41d
SHA25684e92dec34d7106a835e164c3d453068310e87c366d257387b2a6e93ea155aa7
SHA512148cb4895aa0630747a6aeedfbd06bd424a5a5b2c9b5ea39baa19260176e575fc4251901b6c53305d9d1803037fb1dbc5a6e83986c4d84472d8391075e70c97f