Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
5f6fc4222f46de441d930fe5320b4479_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f6fc4222f46de441d930fe5320b4479_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f6fc4222f46de441d930fe5320b4479_JaffaCakes118.html
-
Size
204KB
-
MD5
5f6fc4222f46de441d930fe5320b4479
-
SHA1
2f55eb36178d7000e75f4d86376d017e45b1a516
-
SHA256
4268bf6117932ccb8572948289541c724726e7f1abed19d8ab68f50a5ed67b1d
-
SHA512
484e8c27587b9f23892092c83a06ab74946e8de02bbad2a4f8b0599ae63677a8285427e6456fa439ddd8a470fe1819f2cbc1ededbc1144792ee4a6dac1e9c81b
-
SSDEEP
6144:gd3cIIIW3G4k5QhL8atVsIiVQ5MIsuQyf5bTM+MdBXpKgXpgx4t4tCyumO9mge/O:UcDd3G4k5QhL8atOIiwMIsuQyf5bTM+a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 4584 msedge.exe 4584 msedge.exe 4448 identity_helper.exe 4448 identity_helper.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe 1544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4584 wrote to memory of 3656 4584 msedge.exe 84 PID 4584 wrote to memory of 3656 4584 msedge.exe 84 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 2356 4584 msedge.exe 85 PID 4584 wrote to memory of 3096 4584 msedge.exe 86 PID 4584 wrote to memory of 3096 4584 msedge.exe 86 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87 PID 4584 wrote to memory of 3616 4584 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f6fc4222f46de441d930fe5320b4479_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba81946f8,0x7ffba8194708,0x7ffba81947182⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13378874694535624979,14052507172515959129,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5966879378bb63a3e1c4073f2ecad2244
SHA134f66b80b2b12ac1754eb8e66df862c9d028a108
SHA256c330af523b4b3e6e0f30254b351aaf77f57d07c86223cd16b3eaccfa1e447ea9
SHA512285d537ec722a28dccdae5ab63c1941bf4e1db2389dbee6bbb9023bb60f376947b00f1163c004b96c5771661682d4a5a2ee1a569cc11b7685474d639bbb8e081
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5fd8ccf0a5f250a564694431fadff407e
SHA1b63787e9a75575d184367de4d1c269c9372fa04c
SHA2565d587fbe28d1994cf4fa41337bd62f35229250e76d85c6c04e20d68470e5997c
SHA5128d471b9ef2086459b76e7c587f8b5002aa6afba8c1252f4686a07253e4fe0e729707d8c18988cb7294216a709f2d56d7320fb8436f38881afd1ed4f705518103
-
Filesize
2KB
MD5257bd42b69e2bb51981af6b9093d4db4
SHA16adef94f07c3cd14341c131fa3bfb0bce954aa55
SHA256bb31a10ef6b364d5ea5228505ff5bf646435923346d49af31504aa9b5e52e660
SHA512f0ffdf383a864343db512c0cceb6d60195a6ec69649251cdea80870f8398014417db3e4d9471ddd12c2714d1e84020c327ce349a634221d58ef3ff7d8552c0d1
-
Filesize
2KB
MD5e90d60c8189512d731f18896ed28a6e9
SHA146c118ddd2339e01dbaf0bc0bbc21643e3860f05
SHA2565d7adfe918a2c8d19ce2a49ba1089daa0692b921d496c0233ac7f3531c0b3f6c
SHA512f8b92eea769fb7c892ac2cb77c3a3238556939b58392c407823f8fcd1c12282adade8d6535c9c746e311b81ee1c34e1507cbb8e36713427190804bad8f39bc04
-
Filesize
5KB
MD5d56ebdd31dce41fd8164f046c59eaf21
SHA191fb9e8fc04816b8cc4dd6a76337ad0ba9f2fece
SHA25673eac8dc84d2e5daedcaee30469721de7d614fd3f18cd49aceb2478624566501
SHA512e59a472811d13ebf3ff1ef62d03e6f87092ffd06c6dee81ae723476c8e4f5361bdb5270555a303910231f041a1985013049a89254b54394b596f90e8f1d3242f
-
Filesize
7KB
MD5bd26d2cf64368edd3cf747c82212b067
SHA130f1b1ea591aa5a1e1fd2e026ef6f29837d51847
SHA2566586b36ef361d7d71f3e63ae7757c8b5fc9f16c024ddbca13542742948eebe79
SHA512ff4dd45edf32e9687a0fc6f75231c663274788f54fd04c58b00194d4265556e3460deb868d582e1e6b46b221e56cda4ada4e29028935641793a3a00fc6191de7
-
Filesize
7KB
MD522781ec176f40165a0134602d05ffcb7
SHA1ea18cb927db99fe6565c2db650cf288e0fc03b52
SHA256cf039e3911882321ba525642e56d6ed9678a4f40e8f68bd4f38deab184795986
SHA5126a580aae6b2c2f7cc62a328956b7c7cdc14e2ebfc21d8f2fcd6d1cf395f59d75f3c1c7c298d268231a2fa96bd8c6291c0d0a7a4553fcfe4815009cdbabb85723
-
Filesize
7KB
MD5703a9efa23fa80de802eef2175b56593
SHA1acc7c749a63f81fb0e1b49cff8f85527cad786b1
SHA2569cc1dc2a3fb41bc857ab9d7b435cdac570d7142cb927780e02b9d2f0d383ba75
SHA5122c17850a752a8511c387a27c6173c2c356cb03bd4a4e9082717bf3ecbfd5a57e266e831d6b7e80b7e43b4cd95b092478b0ec7aa18cdd204f354e5a7ac8f947f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e77b212f681e6727a7f56603e7582741
SHA1ff40b20ab171668577d3d2922399485e0fd76ac1
SHA256e2926c3f964b2fea78a7d4d6b20d9b2527ea70eb0b75202579e0419158a9449e
SHA512447ac5e398d6a347fba72e1ac57cee98bc73d30f6fa86a277f3c55be43e2bd75bd0ab523a987a43cc331a2c5fa8486a7411dc26d7432e18e7a7500a078dbe6a0