Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
449588f52e9f6b5d6db9c68d4c5579f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
449588f52e9f6b5d6db9c68d4c5579f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
449588f52e9f6b5d6db9c68d4c5579f5_JaffaCakes118.html
-
Size
60KB
-
MD5
449588f52e9f6b5d6db9c68d4c5579f5
-
SHA1
bb77c3492c02cc3c44fe569f58310e129ad10a6b
-
SHA256
998240bd1c25252c412803681b02d4642351137a6471995727a23366ee17b266
-
SHA512
f824bb1863167ffb5d53f2fdcd821c573d913244af4c71ebc4d79eb834df49728a5cd6bf6afe15b8938622df32e151073d34989af18e9290b27567a19850a24a
-
SSDEEP
768:PFPT0EipBfkN7BGFVVQOcPmBhfj5w3WV2v0/hCA18ncoOL29iQWY:lTupBfkN7BgQOckddw3i2vwlj4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1936 msedge.exe 1936 msedge.exe 4420 identity_helper.exe 4420 identity_helper.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe 3256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 4152 1936 msedge.exe 81 PID 1936 wrote to memory of 4152 1936 msedge.exe 81 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 3320 1936 msedge.exe 82 PID 1936 wrote to memory of 1240 1936 msedge.exe 83 PID 1936 wrote to memory of 1240 1936 msedge.exe 83 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84 PID 1936 wrote to memory of 1836 1936 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\449588f52e9f6b5d6db9c68d4c5579f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe676e46f8,0x7ffe676e4708,0x7ffe676e47182⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7104 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2260,13661806579317530176,8011584105919807493,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
133KB
MD54d1bd282f5a3799d4e2880cf69af9269
SHA12ede61be138a7beaa7d6214aa278479dce258adb
SHA2565e075152b65966c0c6fcd3ee7d9f62550981a7bb4ed47611f4286c16e0d79693
SHA512615556b06959aae4229b228cd023f15526256311b5e06dc3c1b122dcbe1ff2f01863e09f5b86f600bcee885f180b5148e7813fde76d877b3e4a114a73169c349
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD58391a7930fd09874300a971fd56fde64
SHA19f7ecb5f5122777e98342b6846157c9dfa03a811
SHA256ba372bbee9e38e7bd9f46f922b23bffc860584cfd0a96ee6c13e2c53ce75816b
SHA5124df835d281c920730b5d89f3fe4d51f110593623298f212d0e54861d4f8b3b51f3ceb0c1c33a03b0faf3167b7c5765f5f279ddc896b9aab674579a0555d07249
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d1c8b187b8f43df92583eb72158a06ae
SHA1afb82e76196ffd1e1394fe125e2b18de36e08271
SHA25610aaf6c25b9f5bda2ba423e192ab26bd47391cdee01e7edc1955c207b3d1b3b0
SHA512998bd8f529412ef4bee76591454c59fd6ffcb029a7d280fe81aa9d0148fc3ca10efe6d8f8a0456857cbfac773dce702126a4284e56c550bc234432c88a7a70d1
-
Filesize
2KB
MD5b076de01b058fd0ffcfe335d99ff5645
SHA1109d29760ec41790007b5d01401a45ea9bde3d2e
SHA25627d08aa11b0f1c18aae624394c6208e1eee7fde91054432e16f205bbc4a588b4
SHA5127958fb1ba7ba24ac1c1712f1602eed3ea2c6de8bf65e3394663479e3e725118a0e2d691558ba8e3262fcf01a29475b7908efa34673aa00909b999c38e0056cf3
-
Filesize
2KB
MD5266777bc30de5c24b8d8d073722fa901
SHA1a2e2c0e5d637ea9602122a5284cd66581a7e816d
SHA2568250923986cc9c8f3f14e320e6ca0da27b12478167af6b1b9c2231396df412d9
SHA5129b60af49b1b7dcbbc369bee7cbd2a18cae1011cd3a3af418b1fefaaa01ec8c6eff736d38dafbd8519a04adebaa6eaffff047764f76fc183bcd4951c1a7d6627d
-
Filesize
6KB
MD5c1def5a7ab998b14115dd4d06d04b263
SHA1508d7c51c111829f225dd82bc1fbeb3178ec1713
SHA256a5753a6ece5d8587e56b3aeb01a3662807a93da10174e8db69d1c66c5f421075
SHA512b302ee20d0e56226f3999d4c70519582c3f32cecee175c07eb525e0914b2e1ae1cc5fda03dca3e61246ce0fe880a0b0fa0737f6548e9cf9f435cdd7af73e6963
-
Filesize
7KB
MD5e8ef1833cc08429e4a98487966ab0fc9
SHA1a6cff9683b1e0964e73c34148d06cc4d735dd616
SHA256ae4a2789ea1ee86e257fe916fd3332360d78b696b1a4aae1400a1e7fb57cf557
SHA51200ccbdd344bfbc4cf893d91b16c941af1716b52b6a802f77919d8e7d447de2986f98b867456dfe466878bd1f4dcf0bf294292b7438bf7ebc84eb327e64052597
-
Filesize
7KB
MD5084c0cbce342bcabe33761ff9975d1e8
SHA182489185c112439c8ea117e0ed0184a851976f55
SHA25642ca88d7661d5a4bccfc3c7710733c434247c973c4073436e145049e556ae044
SHA512a1147c516097e74c4cd48a9d192062d909c8e79f5cebd216886ab6cedfe5e0c636012956d5bba9d8afb56884c8071a515b6424a4557dfdcc68dceb7725f6f7ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56c211bc0a7c41d9281151d5fb89354bc
SHA10ea78afb67a39683fd7457d44798d8961abd88d2
SHA256f7b030af8a0569c71725fdf3ff7b2d5d2e044041ae52c7f671be4ba1bf947dcb
SHA51279d6ada34c8415a729f88189a998eecbeeeadc06deaab06b484791ade88362d345375e1b1d0d39d7b84835597ede402c3dae1e62b313c20d9bb59900a6e0265b