Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 05:20
Static task
static1
Behavioral task
behavioral1
Sample
7bd64fec2ec40352924e37def0a8cd73_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7bd64fec2ec40352924e37def0a8cd73_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7bd64fec2ec40352924e37def0a8cd73_JaffaCakes118.html
-
Size
80KB
-
MD5
7bd64fec2ec40352924e37def0a8cd73
-
SHA1
25311baa541c78aac206b492d36ab3f1f2e5a1b6
-
SHA256
92b7533c8ad6234d713a7e66ec95ae565c747d0356eaf3396a1616943f9ba6c6
-
SHA512
fa3c318e751671b343764e33eee9a556e0fc15108ca8421ec1489411c99c804b7f533d8d7c20fbb9c6dce16715af901b3927b0b850dfe42b273c8c1a443f98cf
-
SSDEEP
1536:S/bOSH4v3ts+GDtbzs2faf8vVSNkzF560TASfzgfIpYBJNNk5E0W9UHSfej6T7vh:S/bAa+lYa6zgsHSUSuYFEZJkiy+jTlTG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3964 msedge.exe 3964 msedge.exe 3624 identity_helper.exe 3624 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1072 3964 msedge.exe 82 PID 3964 wrote to memory of 1072 3964 msedge.exe 82 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 1568 3964 msedge.exe 83 PID 3964 wrote to memory of 3704 3964 msedge.exe 84 PID 3964 wrote to memory of 3704 3964 msedge.exe 84 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85 PID 3964 wrote to memory of 2480 3964 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7bd64fec2ec40352924e37def0a8cd73_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab1d546f8,0x7ffab1d54708,0x7ffab1d547182⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,6384342728847981268,17313748813833424524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:1748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5623f1bac77ccdc1336b87705eb748251
SHA176aaf537cf6120950ddb1a8bb2ef1c8e7dddbd6e
SHA2562f485975828dfd287a41d44387a784fd3f0c09200270c114857258a65675d77d
SHA51276585ef1eb5083b2983dc8c756b3357853b01c0e258886cc711a383c3bb715a9beaf1a3868cc82b4b53aabae08c343a1d3a91ad9ab0d768197b1c4b57d88c4c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5d8c41603041cbc719119966f6a882288
SHA145fdf7e94d56e703c654e64f6d1126d514312fcc
SHA256564c005b342a1b82d69e668119df0eb7df0836d17d93c69c8ebbb7d9d779504b
SHA512a0e7e46f7f2b0b5792f0644c6c79ec88e6d97257889085980a58091c02bbc53dc4b3ea3402ab0b0e3e88720a6ee4d5c5c9045edeb3109cecde372a1d2e01bac0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5a584879545514dc1f15c812b14adc2c2
SHA1fa6a8d618ee65d2e5eae4e3c068827eaf054f09d
SHA256d04b76bb78687b4c88ff2405afaf32c431ba9635f4eb946c041e70a12c1b27a5
SHA512673d5f7f3864ba92b0d17efc16bf8edf10f79991bb086c723f4bde85594c5a32d2d7149a8143bfa87bd4dc3719cfd8046f8a28c4281611ca122574e15c2ab243
-
Filesize
3KB
MD5fe5bae447dcbe7e15fb4389506cc793e
SHA1ca5246ec287ad3a319db41835f8c41e086efe96f
SHA256c0c7bedbed4dbe745916bb30986c282fe877ab995ee02cab471aeb457d192227
SHA512bdc992f7e5cbe2125f87d01c1021f0a4da1045ef43c8b005f7068ca7d5b7a4aba9b00815302b08c9acb284238d022dae6c1f9ab6f8b27e08d14d134a4d9a179d
-
Filesize
3KB
MD5915861b09f17d045458c9a3be9e12cfd
SHA178e74766d99b55c3977e04176b143546ffdf6e03
SHA256a26144e799e025dc1fd9e5b4e4235df89129e7f5bf5ca056e6b8ca45b4a472e0
SHA512bebd505f9a1519dbc195b8dd999d69680ce09fc736c1456bf956cc986ccb8fec85d3a71407ff8c1200005dc66cb1ee7e5a104d7752e767464d38dc9e56c584f7
-
Filesize
7KB
MD5b2755c6840f5e572ff918c2ed405d278
SHA112ed82cbe96c6b47c42ec1b600f9ed4f0bad876d
SHA256ef3cf5189c55a44d6169ec8da419f1e23f311bbe0bd9e40a31725ae6bd16e0e7
SHA5122088468808bce4be9765eb6062ce787a5d7c6e4916f25a671699e10fa7a50d1c7af86ceb9ae0cbe41077559d8587469ad50dd9b8f51b9964096a6ba6cf3baf2e
-
Filesize
5KB
MD588a5b16f05eedb8d0ef813cc107ee0f9
SHA13cad7b376665db965261d1a25fa47c76ba03ef80
SHA256e830d856df690974938adc1d092318563a111751381faa06244a45eb8e97e1b8
SHA512f8a1068d3ff8159c28829c269f26600becceefc8a450556445cdd711cdde196075d35074bbfaf3e4763c45c0e83c3a028e40c76f82e9b2404097be990e9f5fa7
-
Filesize
7KB
MD540e4ea0e1196911ad1e4039165dd45c4
SHA1eb6552947d0c57988ba2af652f6cb175c0041983
SHA2560c008188d091e9463b5871adf30b95c15ff1edf7c50a574b1d75fad822f6b674
SHA51261a0a739ced42d7d1d71a074f2bea0cb8c67adc4c217d3f85a56c2887643610cf486ee8503eca31a26426da4500f0bd27f983b82f5dca190542e7894bc93a545
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5eb68b10be8dbc123e1a15299b866290a
SHA10101dfb50c46374769d184706f889adb46bcde8a
SHA256062c7cfb9bb9d47dabc99eece86889831f1017cdb4f9fc66dbb94d08fc338607
SHA512fb44d49602d9e544c6eef120e915fdab0226736bab9e33a96cb61d089dc6911eb5b83380188cc5309046028e6c9eaadd1868a2ff22189491935fe24efe5a2b70