Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
d28d10c44d42a67040b74ebe058f5c6f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d28d10c44d42a67040b74ebe058f5c6f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d28d10c44d42a67040b74ebe058f5c6f_JaffaCakes118.html
-
Size
65KB
-
MD5
d28d10c44d42a67040b74ebe058f5c6f
-
SHA1
e1da5c1290ef2f9fc4a77ee643f980ce22ba4b57
-
SHA256
d009b9e3a1184319552da650e48c6489243e4dd3df49b525f41d4184a27d9e77
-
SHA512
04a552ffec3f12c1b36684fe0401f6e7af78f5bb843455ea2297703947e03534c28333e6616d2c55b22baf6d51e5264667c83e42b3cf5c6ca7eaea9179a4a8f9
-
SSDEEP
1536:alAEMJZ/yaPj0/r9Uzqet7Ry6XeQy7szblqJ7i5daGPzj/wCiaMxdsg515bRleqn:aSZyaPj0/r9UzPdy6ZzO7EEVR3R8aeli
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 4280 msedge.exe 4280 msedge.exe 4880 identity_helper.exe 4880 identity_helper.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4760 4280 msedge.exe 83 PID 4280 wrote to memory of 4760 4280 msedge.exe 83 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 3128 4280 msedge.exe 84 PID 4280 wrote to memory of 4780 4280 msedge.exe 85 PID 4280 wrote to memory of 4780 4280 msedge.exe 85 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86 PID 4280 wrote to memory of 3540 4280 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d28d10c44d42a67040b74ebe058f5c6f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9984b46f8,0x7ff9984b4708,0x7ff9984b47182⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6556 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,15840219420632261260,5168964871651671644,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD51ca3b81e0337eb561a4cb38009495bdc
SHA180a4909e1a9b8632a5b4a0423ac698cef83007f4
SHA256ddcfb7346efff8d4dec05e356795c595e30ada5e4f364607bd0c0b12fa392cab
SHA512fbcee40cdea3987e72d2b6e5902663ebc2ede931457686a3f7606ffbe71466f3bea9764b01595c97bc1e412d5028e7c38f4b2407dacf89fcd83ff2f73280e265
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD508cc79dfbd958f3f2cf2b8b3b50578d8
SHA176a5754943a02623ad9a30cc7ea4123931343092
SHA2565fb25429d89406edcd68e73df2643ea627be2d8a85163facf4956979a4f9e314
SHA512f643cc4928ad1889f4a813b3b1fa50bb07be1009ccc09c6ee14983ab08f90fb625f34870aa2b9cc98438cfeda5cd803a3144845f28cd49d7cb0147dbaf58c1ff
-
Filesize
2KB
MD55fa58c81cad7810b175f39c9d49de1e0
SHA101c823f6a0589f62608c759631374cd99f8d680a
SHA256a170cabab084dd1bdc76f4ac0cc53485d03c701d4182b29597fac5fb6f8332dd
SHA512dd0db3f82cd22b6ec7c8c3d757728c2dbb35fac0b03c3424d817ed78a7835df2ec24bb6640548a62c279706e8e8b098fb1d856c0d0b673d47cd4e38168ee37e7
-
Filesize
8KB
MD5e166147941e636a29473223c6a76c024
SHA161ca739bfc569212cbbddea967a898aa3ac60d18
SHA2563f388de13ba561068cd8815d921588924986d3e2d092b025cb1c8b210bac4fe6
SHA5124856dbab0b48d596ba33a3cd2458dc8a77143ffd6ae2770e20706d902f7af3a3f702a40c2225c95b6eda910463d971565f3758d4a0d3400a3dbb938c018934b7
-
Filesize
5KB
MD5bb5f040c8edf5e62c79cd41e5db6ae05
SHA16c39a6aefdbc0e77bfb6b57d0060965824a06f78
SHA256ac9b605737e32a912b8c39cb2344e50f48e2012c6a91c0a458976b238ecd77df
SHA512ccb11feb1044c80ac4cd6a24e433f8afdad61e5c1cc7ac490d7ecaac6ab65049b67258e05a06f19be8d7f548657e8e14c38ef259b7e01b441df86d2ac985d3ad
-
Filesize
8KB
MD5025b00ced4c8e407d03db3dfe90b437b
SHA1fcc444af15d7d84d7299336022f4dea6e871df44
SHA2562818443ddc0ce2421e54ec7ddde5ffdb46fdda2a5aa4c3ed5df865f1f6df3b79
SHA5125397e64ada48c3db69655a2723fd4a313eb27c36b84d3478c8259c307f903ffc0ba50860245d502eef8f388854c9e350b46d5ccc872cd4a0d86ba5256b057f71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD511b08330b690371bfc15f628fb85ecaf
SHA15ca323c695231e698c05ed7213a10d4cfb5eb17a
SHA25612c50cd046fca169634f5a8780f960cf65e79ea11e72a0c60b5396abb957cafa
SHA512cca1a88ec182db144323240cee86d86def3594c3fc11da3198fd005848fa641f2aa43660aa7579980548f32704e2262ce105a95fbb2ef5160c51a756800ea1a4