Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
4d54c7b6744c9d5c4d8377ce546925ee_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d54c7b6744c9d5c4d8377ce546925ee_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d54c7b6744c9d5c4d8377ce546925ee_JaffaCakes118.html
-
Size
49KB
-
MD5
4d54c7b6744c9d5c4d8377ce546925ee
-
SHA1
b23a3a33d1fd6900a59e06442a653b2e41aecffa
-
SHA256
8d28449a1e66dc7d48a7109270e025427bcbb0b6f277915c63aec6a5bf9f073c
-
SHA512
f6221df6a539302d499d9be103c6814c61c04a8a89a5d73f817c79336fb8ac03d8c7f191f01d89a92106623a5ad35c8a345df13ce70fb46cb3f1e16eb83446b4
-
SSDEEP
1536:06oaZsyH2rFWL9YwkwjcFkXIEgferyK0bWhFj:XZExWL1Dgfs0bWhFj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 512 msedge.exe 512 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 512 wrote to memory of 1700 512 msedge.exe 83 PID 512 wrote to memory of 1700 512 msedge.exe 83 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3700 512 msedge.exe 86 PID 512 wrote to memory of 3824 512 msedge.exe 87 PID 512 wrote to memory of 3824 512 msedge.exe 87 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88 PID 512 wrote to memory of 4144 512 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4d54c7b6744c9d5c4d8377ce546925ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcb6f46f8,0x7ffdcb6f4708,0x7ffdcb6f47182⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6916 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4259059008793613029,1829592839547181340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
21KB
MD5549baced2c151db8a02c3419aa5c01be
SHA11f36a9716da201c5e45c1cc23c349bbaae44a3c9
SHA25611938f83bd463e29316808f3e118440f718f1c7a0761bc860171255a96cbefca
SHA51212c40a66af58d9436d7c3361de906077402cfeded97361c81d9900d69d405b5ab002ac36aad3f8152c6083e00755442bd1bcd1766af26c097638051dfe1aa9d0
-
Filesize
45KB
MD594019c00785285cd78d6da8a1bdeaf80
SHA133ba11bbe8c91eca17a84c3dcae4667638a61b57
SHA2562ea5a487d117c082ab04c8b2d979adc04c18f496af90ef2caf9910d9902ef8a9
SHA512b58d23d9333290e203ee3191cbcca4686ae1f9b4c135ee8a8e0f014e7db4efdcffe6aa82b502b2d8e63bde705895a04726d799a4c6b0e22783b6925b4d297d70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5dd26f34aca18f34ccd13109ffe0bc74e
SHA13e30e6b4e6465d1d5642f6453c7cfc9837f648a2
SHA256953c863b65b156ba2dcb1e74dad68e60b1d7a0862a052a95f41bc875e779a420
SHA5125ece2407d725a5c7568ef95ddff319032a8f17870cb35dfa681bed83729bfe227abecc233422f4ab67b80a0d226be1369a193d8cf0e8d38f2b467782e76cbbd0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD558170af42dfb100852c096d94327c017
SHA186dd169ba6b8e239505345e4e4a1daa45af19cfe
SHA25680a3bc2796b7db597a9c537ee6565643c6bce4639e295e2d08d10b1f652335e1
SHA5127f4d2f810817763386907f983b32ec84dbdbd4cbfa6698d0a43a8dabc5cb47effc6220aa9a5fbd2e292209d29c1657b91e26e5492a45af080e0530a184bb94bd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD58eb2290efa266e8611bc1f890ba90217
SHA1c0cc683736c51aa7bbb6365fe6d3015a20f5acc8
SHA2563d17a7c5e1891600f1589c66a0573538cd24de8f26f2c113e7d0ca1c7365ee6b
SHA512f4340be6a2b8e4733735cc08c7a6c61d915d8d071f826387dde1c7159f8d0013e85983a2b203ee0e36c2d954c02f1eb985e749e5bb7fdf53689a1a7556299781
-
Filesize
6KB
MD53e053a5829f983c8ff8bba7873bdf8a4
SHA191dc831affa2184ae0c1961384e8980b1a337f02
SHA2569fca08aee8524bd39826299879e722434d2938189bc45f628e998f8833f92749
SHA512ddf2258a7416603d47247f420b3e7384565aa76f5c6798ef95e386c28d453b33aebd82f67557d0064c45e50c4a6d0756e12be16e21e62796f5a4539e5b2a91aa
-
Filesize
7KB
MD52b473bdcd5c89ffa8992dc16a3bdc137
SHA1ed07a4f4f4dc2d6f827c8d57afe60ffebd4af343
SHA256296b68208971fe69d65cf298aec2071f35f76261089245b8954f9466f2881fc4
SHA51235c1e661af93b5806ad9b703d1e7fc06f24e16bfe35cb0e4b344d0fb61aea8b3d0710231ffecd4ff0611976b91e45a7ea9125f8c521e479f84008ad9e0401177
-
Filesize
7KB
MD5a7aa3676f2f0f3484c0cf8c0b4dc7491
SHA1a063231bb5a6ce52b8108f99de002d515bd75a98
SHA25671ecce3d3d1913270687bea0199b18bd76984c5f5c772d4960b7f8af55ee5245
SHA512c06b56c5e266877ac77eee6bd3eadd93ce0faffa4dedf30b9b0afeec0c4c49d5a8326fef302cfa40ab80d5a663a770ec85633c6719c67b4072bb19efdf1ed2a1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD57d6cf6d5d8a18d8d065299e089a1c8d4
SHA18281ed4cc4a51689f2fb353173c74dbc2460d4e2
SHA256d166bf0b3c374bc61c4a571493cc28eee986538b24e35f3834163e1fbdb6f366
SHA5124c7f8e7732357edba3cbe7cb0cbfa82fc1ef6c6ddee92dee0cc8198fa7e7e24f732b4a51a03c0b34490f8118dd0a59b95333998dd95bd2f1fdca673927953b88