Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
236cd08dc341c093a39bcc08ea09339a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
236cd08dc341c093a39bcc08ea09339a_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
236cd08dc341c093a39bcc08ea09339a_JaffaCakes118.html
-
Size
61KB
-
MD5
236cd08dc341c093a39bcc08ea09339a
-
SHA1
501121150438147fb781d1b202d622afda7c7c4e
-
SHA256
7d1e8f3e2cb67013396c75bebbdb6ea1bb4deb8005a31e5991c68e4b06493409
-
SHA512
9788a818d9f32edb83a1cb00c86d4cb7b7d6cf1154ea53acdc964778a0cc019b956272bac2e2e507cecc2d03122d6543e0ca077da4012144d03d8f373096d87c
-
SSDEEP
768:ipHvvCIoYeQBq1VwOENJheFcuQkM6BnbUnbmdtr7jT+Gu7KxTgpIe6x5ixXh1Jrk:CHv7oYzq1+OENJARNBj0Jrk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 1560 msedge.exe 1560 msedge.exe 2764 identity_helper.exe 2764 identity_helper.exe 5844 msedge.exe 5844 msedge.exe 5844 msedge.exe 5844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3248 1560 msedge.exe 84 PID 1560 wrote to memory of 3248 1560 msedge.exe 84 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4876 1560 msedge.exe 85 PID 1560 wrote to memory of 4900 1560 msedge.exe 86 PID 1560 wrote to memory of 4900 1560 msedge.exe 86 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87 PID 1560 wrote to memory of 4792 1560 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\236cd08dc341c093a39bcc08ea09339a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff95ad46f8,0x7fff95ad4708,0x7fff95ad47182⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,7727221539728324103,3703833477839253277,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5ae541740152e04de5c7557669bf18fa2
SHA14ef9281586158542f119612d8843d918328d6a4b
SHA256fee1eb1767acc18a4295e7502732ed4169de91603f1b8083089712c172395720
SHA5123ed91bd5a171e9bb96fc67f198b34b0c29cfd1d542ce464e3c1cbfd9ba727ef4ab75cdd904848eb686c00a53b844c30d8be7406eae5ce019972c9a3c95767f0f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD51d1ba1589c9fb6a1957190b3aa7e8c17
SHA15349958b4612e0c0a5ba33d043f1ef9dea524e68
SHA25601b686ce0e1ba335cc4e9d03cbcf4eb8594d432c94eefdbf1b50bbe7580ac6c2
SHA512efa32c63019e16d3c2f6d2c98457647c4b46735d6c50d874256c1c43e12f9ba224c6be6b5c835faf21162660066d51e8680ddf27c99a5b09758de305b78fc013
-
Filesize
2KB
MD5dc7a94ec5f31fd23473aa9fcf324948b
SHA170f29e87c4eec3a061a783f77aef13a36c5923d3
SHA25602f80756c52577a9129a9c3d8d812ffbdfe13be90c7c3979932a7b87577fd5d3
SHA512f59b06560c92a24779c628c06d33a0d3ed86645a465bf2d0958ad89f2150aa92cc8ef19bacbb1bf9ea08f7d49c4ffdced5747653d9f037ce9f5f019ae676d26b
-
Filesize
2KB
MD52d1b19a1cb30de8c86ae6d57040dcdcd
SHA1cb18068366ce3ef3be0e45660ad5b6d745ed3a20
SHA256fa3a1e3cbda761ef2244ea9b10ca7ba3b6cd95b3cfd9c5da54ddca59b6a5b4ae
SHA512a82f424529f4704531d7703f9a6ddf9f40d1945aaf30981218b62bee58165b3a673fce959d79e7b0964a80d424fd3d86c1f79ee0de643db6ecf7cc42addbb314
-
Filesize
7KB
MD5f4263ee59ec11c9bc82b534b0a8ebb6b
SHA1e66182f5896b4649864f1e6442f306898b20efba
SHA2560418deb78826ec745a6839dc79f4d740d4843f339326b70544aa5072e7b80b7f
SHA512a6b9ed31ac2b3ce4856fbdc8cf485f8a1362323ab72c0bceec42db5cf0b427553476946311a9a653acdc6feb6adb908af3a5d2166eb9156590fd44b64d2202fc
-
Filesize
5KB
MD5ad50c7c8227eddbd96feef5ca2d119c8
SHA11aafaf1bbe873e0f7eb733b3c775fe68aa055861
SHA2560da9228ae4df0ee239871a688ed798ee1bf8aa6e12ccb7f06d9ba8a8c087f81b
SHA512472a709c0454012f606ad1902738b7612c611d43e1d8ecbd22cff07b7468db7034c3298dd917ea892368591a3f1a57998c36e472c1900eb39ea2d58861d3222f
-
Filesize
6KB
MD5eae35d28397d128277755fcf1f558c53
SHA19c5068f7d40531d7ea0b1ed4c9abdf9ec550d361
SHA25668b9ffe6a0469714821df7a6a4667468a8c0f404d1cce6ec5d40cc266e0ec2b5
SHA512b6ded32a37f2771d09bf415be3fe8769a04671b6567be7a2e7b1af986aeb1d903202d00cab45caa26193a365bdc18f311886f093e1ca2b415ebd9ffb0dd31de2
-
Filesize
7KB
MD5ea922c6cc967675ba41a56adaa72cc2b
SHA1e3cf7e9ea42c42b31da65d5c74d4af186db01c33
SHA256b9a995f0ed796153c16a68ae458669e826a4533f26841a621b2e42cd162242dd
SHA5127b6e250b4df16cf3d7cc66d7a617d9621f4477aa4eceacc6e08276f989d498570610945e67c7e2223da643f6243135c15f9d2326bfa9f684559f813624b4ea39
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD556e32fc05cad2de952cbbf9baf1b51ac
SHA12c97ca6dfb571a246f1db8bdfdf0e744c49a5d17
SHA2560fb5dbecd70238a7623db2816d7dc98d99b9e0c1af1a286c8ee802dba6bf2064
SHA512294ec0157fae975d244b717eac3e0bd43ddb69cc63ce649b1b5f85442ff2e697de3a7fd3615128e5645513f27be55258363695afe7e0bd1af4d6c89cb5ce9c6e