Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
786477df726ef5b368a373c7c12538d1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
786477df726ef5b368a373c7c12538d1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
786477df726ef5b368a373c7c12538d1_JaffaCakes118.html
-
Size
76KB
-
MD5
786477df726ef5b368a373c7c12538d1
-
SHA1
8763d33419238b0e5d8a24f765d144bfeaa1d0a8
-
SHA256
9a569d94d7c1d47673b35e953ced48844d62a6cd37349b79bd037c50a284b302
-
SHA512
ee698081393cff8257aca0be9785e8f415402d65ecc7bc8f2b115366ff08c0d707507f635ed35f8236b42a1e63bc3457f3408ecb9fe8d0945d558b8b17a1b4fd
-
SSDEEP
768:IuVC+slagHgOriWNMayokEYPDOtO7ZJjY5K0VmRlQyrqmXJtLu29NK2:IuVC3laggxEUOt0jYAQyJtL9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 4180 msedge.exe 4180 msedge.exe 1236 identity_helper.exe 1236 identity_helper.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 416 4180 msedge.exe 82 PID 4180 wrote to memory of 416 4180 msedge.exe 82 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 1820 4180 msedge.exe 83 PID 4180 wrote to memory of 2624 4180 msedge.exe 84 PID 4180 wrote to memory of 2624 4180 msedge.exe 84 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85 PID 4180 wrote to memory of 1920 4180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\786477df726ef5b368a373c7c12538d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,18121425758256708709,10422900537330787128,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD507b1ea47a19223a66e91ab4b9f848ffe
SHA1bd309cc39f05fd9333d17820129af4e72130861f
SHA2566c952963db5a48567505c6e552910b5ac6f2295f97a69f0318e32018809c58c1
SHA512469460bcc55941b3017ad4267c11c6a7b99e7b71905721207f027d6b64898a1b99d7311b2961810e0a776506b4415489489ea3b29bf57f2967a5c16d5ea0ccb7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD58c219815d12125310fcf5fe8f8904ab7
SHA16355e084a21a9c1bfe0d48f99decde9e3c7950de
SHA256acdde85c72439319fcb499cf341b95ece9a53f448520d823db443377db111221
SHA512f4708ae5f7a8aafc560c5d6e63cdf5c2a7f7a6265fc72e9202e84344ce74dbdbc35319e6f80d72225f4fb7845999d1edd6e8ab87016e4ad6c7db33a2c0cfb432
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5dfb263e7a6f6baf74218b5f2b069cc7c
SHA19c938fb295aa5a0ad78574aea94da7dbbd77003d
SHA2564ac55470dd42dfdb0bcbe991beef7db1b6ea9e5df2797ac61d6aa0eaafeca7ef
SHA5122789e58d914a98c84f1c3b47f6ef8c5358ffdf5e380ee8f88b5133f5bc5a0e55eccf469c69f00784379c1046618504cb4e9142597ee4e7fce9476326b05fa61d
-
Filesize
2KB
MD56dc60a1965020cf8bb036c8f879293b6
SHA16452568f47ee698eadf566bd619f39c72359ed09
SHA2569111566f1d3266049cf00d0b6408f9df89d5993e26c44ad9f97938d2962fa5c3
SHA51245ac71b631f77ac14668eb64c8ba1ef16500f65d0b22659355dc1c83ff6cbc9352b235a7c874e1d836fedf4b647bd2f6092bac8ea92a4dea8ee3f96e02e4212a
-
Filesize
5KB
MD53207e26c1985c982edac7cc70d836426
SHA1925c47e6ab5a9a200de77289c10b96b75b9a1975
SHA256c2beb84d4dbd1ab7d7766706e685bf73029aa200eccf8e160adfc879aa6e7360
SHA512ff525752d24b3c85862895137f6446269f4d64d50ce20550fab2241fe60357efdd578f5c46295221a885813def7994137087ae189d877ea36957dc0a632c28a4
-
Filesize
7KB
MD523246fd7d31cf3cdbd49476172171794
SHA1dfd5a8995046c55426052860cdc39b7cc7e20602
SHA256a5de8cdf6dcb838895bea73402df964d3ce267c27427939deef324fb46dbd2c8
SHA512b3b1fc15f7623d0a7425866cb399d8f11d19385dec82efe099f405ac0a726812b229aa6b9023cac41e2209476fba1c0c612bfacd9304900f7eb1aad0b91c1ee2
-
Filesize
6KB
MD5ce2fb232c558850910ca1f8358860211
SHA176763cfec7d8ea37928e2b6848d83d6593ee0c9f
SHA256577dcc2dc91cf83f7cd1d640e596cc17528584be4b882b5815f45857daa5a524
SHA512e1514f9363d8eb9a4bdc6471b95baef8117ba536f56e571bde8bea99c8daeaafcda680f2a716304131d6bfe74a1da91ff512c844b7d10e1f0b25e21aad2147fa
-
Filesize
6KB
MD5d400f925af7baa25184baec226e464a3
SHA1038ba17d28556588a1c4b738abddcdf19cdc99dc
SHA2560712cb34b259e60caec6c000136c6dd59674676d1b89e01d650bd46bed57f98a
SHA512e113233d73b3201f4b9423f39b06a157072008189d678ed2af4393f6164ccd6c065c36fe91e13ba6ebcefcfde3e81447684040aab1b77ce869b50d7f76463fb6
-
Filesize
698B
MD5b6da86e99ec577511fdf991f68901c8c
SHA1ba3632337f47cb1c482b4cacb52d1f3e4796e418
SHA256c411b0cc62868cac011c54ad196242e9965d53725631ddb5fed0995105b83bac
SHA5121edec23666dc57e99ae4bf189abf06238b8458ad13b9dbfae162821f4ebc80ae8cc10e9c455b829a54d4bea4e73f391a02a04485a2e15fb70c40cadc18b6d348
-
Filesize
368B
MD5ae07d23d287c4f9043d557ccf7878308
SHA1844619dcfb53bd6790ee70f4868a366435d0208e
SHA256007f64b834bc31952f52f64db13d39b622753017df98a2a2ab157a560f81a524
SHA5121199869552b68a365f73eda0e65cb6bd27fc88d8b65f61224471ee3da970dea0bf06bc29ca15b8b4ca526fc59596f794e18299234f6f6d06c883ff4513d29595
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c9349d4c417915e4e38f71d30d3fc021
SHA154131fbd17f55e8ad2790e2c51df7b14ec31c539
SHA25651b97f0f3050da88e8754ee3e008f5fb33a877cd52fdf5c4a029b0f9b0fb26fb
SHA5123d9ce2717803bacabf2e9a57c5825426d0663f66d6d31a4b67fa2c49f013dc9d9d9f94a1c39ce62f0482b198da4ae376d1ba9c2e82fcba5194b4730a05a1b2dd