Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
d226cc336fc79453c233a8ccc3a92022_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d226cc336fc79453c233a8ccc3a92022_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d226cc336fc79453c233a8ccc3a92022_JaffaCakes118.html
-
Size
50KB
-
MD5
d226cc336fc79453c233a8ccc3a92022
-
SHA1
5fbccbfc69bf7827d0bf2ec892cb4a26e7548f2c
-
SHA256
ba02411f9cf78d9fd7f3e506a8fca794bd0ab91935cd033fbf7ee9bda3525390
-
SHA512
03250119a69df6f5aebf85ec112b5a9191aaee7a29a2ce024d22d0db088d2a0942c85d00b879501e8b6d27bb3b0bcf363e1ee51fdcef8dcdfee4677edda8a11a
-
SSDEEP
768:PFYdnT0EipBfrLWMeOegeBMoM8G8VOFi76oNDaOor29hhwr:mdnTupBfrLWMeOegcu8G8VF6oN2Oozr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 4744 msedge.exe 4744 msedge.exe 3264 identity_helper.exe 3264 identity_helper.exe 564 msedge.exe 564 msedge.exe 564 msedge.exe 564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4572 4744 msedge.exe 83 PID 4744 wrote to memory of 4572 4744 msedge.exe 83 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 5044 4744 msedge.exe 84 PID 4744 wrote to memory of 2964 4744 msedge.exe 85 PID 4744 wrote to memory of 2964 4744 msedge.exe 85 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86 PID 4744 wrote to memory of 916 4744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d226cc336fc79453c233a8ccc3a92022_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabcee46f8,0x7ffabcee4708,0x7ffabcee47182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7056 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6472 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7024 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,8825449745584432583,8369817294458771568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5556 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5ef890b01d0a5095b936ca023855b071a
SHA16744ec6f89c2726e84a79f18ba532d21889c4baf
SHA256124ea457999b2c059cc6fb25c067b7594323c524e646b8c5694aeb9b5aef8e72
SHA51257723866c475f638983c82f8d4590b6d492a8925ebb41dcb981e77f6c04a79991b9f053c834aa51db52e0c71748641b485b04fd8f8f4e2dd3902b35116e903d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD517897437f16568fa51ed4e9de7297c84
SHA1b88fa1bdf7871bdcdb3ba9700ccf962de26d0d3e
SHA256fdc5debecf796dbc55852f6ec4b54c75062328e41ea98476fee599bf9d9cbdd8
SHA5124a78f81e30954fb4f78d30572701dfb2ed39620d9f34a88360c088dd845e5505786af645d5b564d613890fca50fd71a2897e7bcf262d822b2c6e2454792c0635
-
Filesize
3KB
MD5667a5d0e83c9fb83a5251bf849b2c86e
SHA1aabd12fe4ad47bd77775d463519fcad20d6df879
SHA2564ce652bb12ab174fc91d74ea4a08bb286f3f704412f2d420df07ba5a6f85291f
SHA512e73a2d1e9954a624443141ad2ae3ca5542eb76ed1c367c11defb1699c6fbe156f8b70802e7760b3ac2cb6b9366a18a5223ea33a13a2752cd3703684e76295994
-
Filesize
8KB
MD58e6f2006b16959f758de2463f396a236
SHA15f39bc8c5cb38f76587d4aea45bbe3b9b021ee9d
SHA256119bec47d3bda7917326547f808a4b995d2fb05694be8a213399d8e30497e894
SHA5127f9437ec52736944e7f97e91ff1d2d84eb4ef552c31e37ed41c46adc110a0e6abf6f3627c8e900da88c86e26ea82e61af754f428e83d0b3f621521dcbe108910
-
Filesize
5KB
MD50a881369e56b48748ffc285de206c177
SHA1277efdc01e74f736a165b9115ce4a021c3a6f0e3
SHA256205eff819455b7f58fccb41d05085c58ba1f465efea1b700abba7a41d9e6a9c9
SHA512a247900ddb43c6df7f9a6de5f5256160b22c80bbffc2747b6b54bc1bfa62a1aa5c41350b4597bf005457f0967103129f935c40cfc6b09b1dfed7822b1a828069
-
Filesize
7KB
MD522ffb86ce0fbb5ef956bef04324f085b
SHA131a81e303cceeb208086bfa8a444e4d49983bd21
SHA256c2f81f4d9106df7b5f987a6e640172691c909f19957f20bc7eef86f6dd6427c5
SHA5125882af3fa904d5fe42624e1afc15c981551b2e703bf6a23006603d906f79eb41bde880ab1c71062fd24533a189b91d2a6dfa3f2f797643034c856a9f4be00272
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e6b4dcadc12ab54104675debe77327c4
SHA1f6b77ce0429c77ed67117eb8382edc7ce8de6488
SHA25662a6b6985ff94c67bf2e722edbab7b8b60c4a6f221564cfc072f5f0933763628
SHA5123603d64d2b20b3ac14fe6a69d083980d10e790deb7ffbea9271c3d7e0820c764f453ec54c24ff5817f09c9eb92456159c9c0bf2af5b61428b42d30313f89d36d