Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
2180a08e214913fb89fc32313c723961_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2180a08e214913fb89fc32313c723961_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2180a08e214913fb89fc32313c723961_JaffaCakes118.html
-
Size
27KB
-
MD5
2180a08e214913fb89fc32313c723961
-
SHA1
97c04d3707ce7f7fb556c351e688223bc6d97030
-
SHA256
205f880e4ecdec7a5c3ac2d3eda84e02590da9b524f88565308fdf117baf135e
-
SHA512
f235d819e00031259212c26413325533b0b322722cbd6ca75e9d9c76c8b2136c12d192f1eccb62668b0c511b83407d0eb0add43f82f98d8ce56063e11d185c9d
-
SSDEEP
384:JDYpmteubDNTLtN60kYQuIfKx81HMiy8VRgEKKX:xYpmteidLu0kYQffKx8HxVRgSX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2818691465-3043947619-2475182763-1000\{6CF5FED8-501F-40E2-9E79-2BE341463E1E} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4448 msedge.exe 4448 msedge.exe 4880 msedge.exe 4436 msedge.exe 4436 msedge.exe 2188 identity_helper.exe 2188 identity_helper.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 1852 4448 msedge.exe 84 PID 4448 wrote to memory of 1852 4448 msedge.exe 84 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 404 4448 msedge.exe 85 PID 4448 wrote to memory of 4460 4448 msedge.exe 86 PID 4448 wrote to memory of 4460 4448 msedge.exe 86 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87 PID 4448 wrote to memory of 3280 4448 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2180a08e214913fb89fc32313c723961_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb40d46f8,0x7ffcb40d4708,0x7ffcb40d47182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6604 /prefetch:82⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11453799473305774031,10731183845882598127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
840B
MD582dfaa35129990b39cf513e1080c5d33
SHA12b23b4fce1243500d00d29381a33262641a7d679
SHA2561ba7abef274aa4a126d426be9b1aa11e5e70191bf143eb8ff3627cc59c50a3aa
SHA512b1dd2d03abeca9eefa0611845a485dde23950fd2183fe4600be142451a820649654181f6e395b8946519126b7370735f3c769d710203ebe3f1c85e4e1206c032
-
Filesize
5KB
MD59cb190324750c9e4365cbf96cb905b1e
SHA14ddb85ca31752bfa9494ad395b7251a67c584a7e
SHA256a5490f78db784d2418dbf829a7c405a6b89bfac70d34d319b2d08ff4f93901a3
SHA5122379c6914074155dde9f642aca8f6ec0d8f3627d6f20fd0694cd00e4dbb2c52466aa3f46a0dc9983ef2d0f8473425c6d6ad3bedf0fdfbe1ae917a38bfa691fdd
-
Filesize
7KB
MD57c759567905c2796a3039e6ff7e36242
SHA17274107516efe8db18a6fea4898d708e9983ab55
SHA256a96987a020ecbdf5d1fb82c53e9489bae62f7c4be6bb9380a9363b3bd11f6e40
SHA512ada908ab8da1140825177e7fdc539f7d66a4b2fe0e79f5c09a4ce0660974d25ff3d8851848478cc8dc9aef1fef53599f79e6b6d9c682f85b2eb4ad9587ee037b
-
Filesize
366B
MD5d1855a1605681ae507dd077471edffda
SHA12cc867c416bdc138f43ec7fb6caca7ced3df492e
SHA2562af438052ae6a10d579a50fc4b074ea9cff2edd8040d6b12bdebf67dbeacd3d8
SHA5123b22f153c19e6e41c836ea4e04af21e33a957f298fa0cc5d0abed4052a30dcbeca368b069a7f316a84f4920ccd3e806db4348bbbc8a7335e0a4ad442bfaa6bc6
-
Filesize
370B
MD5d81b9df8c93cc53966ef0de318494f19
SHA1b435a75e9d29f1dd2c436b94804181c78f578f18
SHA25683f1d7dbe600a9b921b0717bb1625af9900505bf1b1ee1f1f71b1b8f6d2ea9ff
SHA51214c1986e68b94f2749bcd6194e38b0ee80cf41bf0a72339900153e4ad91628e853865be70a6e6f32b8e6d3565b9d071052b7c041ee3e8ccabdf12431ef9479c7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD581ae8ce4a05d49a39b02e2d4dcd375da
SHA1634793a8e141052c9db5cb48f0f14552a78bbb3a
SHA2567fc0f7e14ea174e2f8555cff8a7849833529b869b907092f7cfe03d6a6b74aa1
SHA51285a85d5a0575c3b8b02d7891ce7a810cf69ab3cd66320dafb63884d7ce64905594fd4b3c2889e3751c0d5a2e61550461f025f67a90e9dba389dfa492ec429fb3