Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
13df303fe242ed6331934014e3ed5701_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
13df303fe242ed6331934014e3ed5701_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13df303fe242ed6331934014e3ed5701_JaffaCakes118.html
-
Size
58KB
-
MD5
13df303fe242ed6331934014e3ed5701
-
SHA1
b5456fb7af7bd8735d7279370b9e19376d24e286
-
SHA256
4999108f8c3a9d2e67c3644a4dd70c01402d88973b29b1d313ad0cccbc62e8ab
-
SHA512
6eaf9cb151f15bee227be48a4535975bb4b18d9e604d4d3510d1bc20be0c034c34dff8349a25c4b3fa3815415d10048ea8fe812004ec9b6e410242879f1ae485
-
SSDEEP
768:5xnT0EipBTjeecGcGdBStXezapk6o12YDAOllxsc6IO7nXEB5HtEToH/CeWgWFEQ:nnTupBTjeecUdBX6oWOfxEED+oHxWHT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4944 msedge.exe 4944 msedge.exe 5972 identity_helper.exe 5972 identity_helper.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe 5604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2176 4944 msedge.exe 85 PID 4944 wrote to memory of 2176 4944 msedge.exe 85 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 2560 4944 msedge.exe 86 PID 4944 wrote to memory of 4124 4944 msedge.exe 87 PID 4944 wrote to memory of 4124 4944 msedge.exe 87 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88 PID 4944 wrote to memory of 2628 4944 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13df303fe242ed6331934014e3ed5701_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffda3f46f8,0x7fffda3f4708,0x7fffda3f47182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7040 /prefetch:82⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6564 /prefetch:12⤵PID:5992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4820703343747661820,13093208684592841816,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5c700e77e6812672b104718eba9b405d7
SHA114fa141ae6e3c03dd5ba168c082daf6b7e0632fc
SHA256cb7d8635e587d15b7603e7745f82f6e554edaf9227bb083425f0516f1cf8deb1
SHA512b31e4f904389232b7460029df7dce67a665923124b54b2716c13055b5cb9a92c6222927ca5fe9314a2b5b3c3b4cb15bb5bb17f476a0f45bb2959eccd5e04e8a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5a90cf537f4e6804d4cae20ec79448c00
SHA117ea71296936c16914c827172056e10530b88a21
SHA256b1215c2c4082505fc18a09da0537c58db102ac2fb843d88ee25df912fcfab241
SHA512df87553f76e4a82e9376402b53ac37e7aba4eb43444065bc2a5cdf7a25270719b72e4f423f2fe861a85c977079b6cf2b6328aa9961ae9e08c46f7cf2f6aac3d1
-
Filesize
2KB
MD5dcc94573ced6af34241c0f3b3068efb0
SHA185a7749012cda113269dc50bf19d67cf7fb3fdc6
SHA25609502e0a5608631d3660f6a05fd777b06b297cfd48ed28d30a1f022bd3085f44
SHA51203bfc09912540d99565d674c4b6c2e747f58b9fd84413134692081baca266e58c0148efe23913fe8422f9fa1793db597707c1df0fb24fcef2e0fe0266e10eae2
-
Filesize
2KB
MD5ea5627aa558bfe7b6b9139877336efde
SHA19a31c3248350e23ee1a8bff4113c364c0a392e76
SHA2563eafe177d0a6be4a6fd0beb9c2861082b5bfd0c1d36606f2aafb118267fc0b5f
SHA5123b7bc1629ee331948d1a7b3ab6dd2e9cfeadd00f8a5f2820f9824925ab95031d86d0a14e8c4df1c1f3cc9e4b199950d96c1688137c9dd5e74d99ccc0b95e70f2
-
Filesize
7KB
MD5bf591691b42a042ef6bb0fc2ab153b97
SHA114d1ee1084cec02dd45c6a22a33524d30ef0f02f
SHA256c503c5475e64bc9d36a76ab60eadd1fa49e3773275cf822fe701f360315672b2
SHA5126a9bcede749298db10d24d5b9e354f3fbb204c62e187cbefe60f021ec8b80149626f4731b9368984e06eae61896817982f5873a8b20e25ec57004e4d91ce3756
-
Filesize
5KB
MD53a145f0445ee39c4423a67e6ca3ed2e5
SHA1e66441f68d0f1121c795867d7bc49b954291cc90
SHA2569fa080b84436301708b4b0c540c41fa40fce801f17d2f21c8f3371d0a3f0438b
SHA51223ccd070a1965aaa26cc86d25f12300d6aa4c225703126c4753626793c3a6a2b6eeb99017cce94e86a479b731a587a76fc6caf72f32adf8f0d5e1de1171a4b54
-
Filesize
7KB
MD587f3f34e2d14fd0019a8dfd067e035b6
SHA15d52c9c95d337be31bc264f1c94f9a9f474be031
SHA2569a4d2c1517075300bf15e6fd3400c14a1e3aea2bf19174570c1e560e39bc6976
SHA5122ed1cb0e53a0f48bdbd3a43efaa0f31b30858e0dff67f2ba42288961188feb4ebbcdcf246af87a404998d9596473def93d10bdc55dcebab44f131539d0e4efe8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f938ff176487fb533c2e272b42c4c8db
SHA1f36e6f40780d89f4e80d3e7f15c37a2309ab4cbf
SHA256ddfd91dc04f9b90a23ad6af6ec98145ddb404730cc5154fd462d58c8c2150eb1
SHA512330fc37cebc7a56d6496d1b48353c6ec19ddbe55c5f65fb1f159d834830255d8a72a0e9704201077905bbe2f89505497431097b5a453188bc517917ac586e71e