Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
78bb16aae9caa1b3e91a25d09beac3f1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78bb16aae9caa1b3e91a25d09beac3f1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
78bb16aae9caa1b3e91a25d09beac3f1_JaffaCakes118.html
-
Size
151KB
-
MD5
78bb16aae9caa1b3e91a25d09beac3f1
-
SHA1
d1b8f61080aeb8b5ab35f2bbb571661545b84156
-
SHA256
e803834028ce905146240e6a7d58ecc401c756e1689fd760cec93fa261bad9dd
-
SHA512
06e861125c9595b8d2bf13f2b47929997285d8f1a2dbf7fa84f00f8e5304e92210d075526ea15ccdae04d39da6c2430ded5701cb990a12989442dbd8546cf95c
-
SSDEEP
3072:1gInVzuW5lHI0viE4CHXLz+dfMu2lAOHBPgKMtQZO:uUtVBPC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 3124 msedge.exe 3124 msedge.exe 1700 identity_helper.exe 1700 identity_helper.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe 1112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 840 3124 msedge.exe 81 PID 3124 wrote to memory of 840 3124 msedge.exe 81 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 1276 3124 msedge.exe 82 PID 3124 wrote to memory of 4144 3124 msedge.exe 83 PID 3124 wrote to memory of 4144 3124 msedge.exe 83 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84 PID 3124 wrote to memory of 2080 3124 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78bb16aae9caa1b3e91a25d09beac3f1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa63f046f8,0x7ffa63f04708,0x7ffa63f047182⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7156 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,1073880614517188807,9348968662352171305,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52128f8b879513c3d19712bacff7809ab
SHA177d7acc70861db4acad6152059efc2aa1aada865
SHA25651ed6e1d1a70aa2f1d83b072140a56c3ad22b4b9f4243df08a7b937e0c287486
SHA512f16f1b1f6482a8e52c2434ed9b54c67d0f5cece45fb984c45f035eda398b8a8568a408540823cb0c0307329f529108e855ceeb86199bb395d85bc6db8b82d641
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD51fd59961e805aa922b9feebebeee0cf5
SHA16e4f8855eb63ce9e85bd73369b2f3f41ff6f48c4
SHA256dac034ea737e1831b80028515a3daab10ceb4d3a3a6b0230a5dfa2fd5a449a0a
SHA512ed20f594e206e5b283e401cc8e1a5a37605d1885863006a2da9f17b80e533a599494ecbd79e453a43297b32e2ffb7cfc27c4ac1d78b7ae4940fed12a2bf383ac
-
Filesize
2KB
MD571fd536770e073f1c8e8e11aeb0ad51f
SHA1478dfcce70cf4397d1f99b6d18b1801ac5e6c023
SHA256b7447042929c0faac31facf7df7c18f6ec87a8ce975212697fb1b04acb17b4d5
SHA512ca30b119fc4a3eca9f3c049491bc1e2779f54b715eb58b57bbce2f3f7e025e2f6e112a7772bfd1826960f1641f21bfc68c82da71bf1a1b0987b5f72fc602c722
-
Filesize
5KB
MD513abadf469645bbf01cc6e1095afd7c3
SHA142b31ca35a847d10d68247663aa3763404f03285
SHA256330845ee0f76315126fc6a4cf340158b6676c6628fa07670a4b9a1353fd53887
SHA512481645cd22abba965a4e80d212b1c660089b45bcfe5041374ab3cbbdf933d4f53150a929eea47d1a98ac6a69d0470ca1f696b9bcb622c962e47af8a42b858f4f
-
Filesize
7KB
MD500fe8bb1c7b5a281cd535845e432582f
SHA16199d5653dd2ed4b1af65d6ddb0fed910f13b908
SHA256f717e8c6289ca22a8e5607666f677a1cb6fcfd2779ce57c99c1b4bca180fafa2
SHA51207873e795f93c799070e3150e0f1452eb8e57c66714a52f849909b6a199857a38e1b751313eb6802baf104b44693cee4dbb4f48b31c5c7507d784bbfe1419878
-
Filesize
7KB
MD5026f8e41e323f30c19ecfa02e09d0f8c
SHA16db6dc7345e4fb6b609bc39888ffba3e23b27c40
SHA256fc691210c329d1b124ce2defa8e8969576faf3b36522a77192fc58fcb209128b
SHA512e364bc56221ef556d281c5e3de0934050e31d89f3e0a68a0d2d99fa506dbf650d1c612e658cd8b36ba2733bc0096d58dbba292dd8025d78090817868b39cd033
-
Filesize
7KB
MD55909cd3fa1cf049fbad057613d0daea4
SHA19fe7584266806a89f43de3f6480467a6dc1f7a31
SHA2567561e740ed6aa8378be600f49d398d5665b040fe9d3e957f52e3155fdb8b1de9
SHA5126670ab04288a9aa81226666a44581dafaf35210ed99f5ac035f68180e12f3c47c5de2435534ef6d5db4a98c6b533ec4c297d8d880b79c18858d695bc85f1d159
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f2b95b4aba9cc31143b9e77056804cd5
SHA1dc1b5cb24c1e1d7afec2f4151733b361ba04027e
SHA256e22d60b64399fc8588bc47f7fad657e4d16a5017c5db9519ee361dcb376f910f
SHA51201050ed20f5f6bfb6ab1119bace97cd53fc8d27755fe1cd1b347ccba0c6bd04f78a3347cccca77d397cd7c8b474c739acb6864630230466e13ed28ab2f17d730