Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
d5b1c12ad7da929b87dff19903c98b5e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5b1c12ad7da929b87dff19903c98b5e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5b1c12ad7da929b87dff19903c98b5e_JaffaCakes118.html
-
Size
126KB
-
MD5
d5b1c12ad7da929b87dff19903c98b5e
-
SHA1
87274e1d8a4ffb8f946efa760ccfa6aaef88ba28
-
SHA256
58c9299d881663b3cf14251a095a03b5ac834e8b304f76eda25b197a088df08f
-
SHA512
1e22f6e76461db669813ed73dd6e5889f554a908d3f61c9ebf15c216c1d5bf0ae8b8079ff4e32490799b88ee6ed4587d8f91d16e39a93a7bc1be67439680a56d
-
SSDEEP
3072:yW/eIsbscyRzLhxNlG2Tj7suCz7sd+EFHftF:yW/eIsAcyRzLDKhW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2832 msedge.exe 2832 msedge.exe 4304 msedge.exe 4304 msedge.exe 5200 identity_helper.exe 5200 identity_helper.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe 4304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2584 4304 msedge.exe 83 PID 4304 wrote to memory of 2584 4304 msedge.exe 83 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 4660 4304 msedge.exe 84 PID 4304 wrote to memory of 2832 4304 msedge.exe 85 PID 4304 wrote to memory of 2832 4304 msedge.exe 85 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86 PID 4304 wrote to memory of 4808 4304 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5b1c12ad7da929b87dff19903c98b5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff914d546f8,0x7ff914d54708,0x7ff914d547182⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7392 /prefetch:82⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7388 /prefetch:12⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7016 /prefetch:12⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,16376685080172627094,13663868510836969132,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5fb0778b6da84699806a9b830ebe463b7
SHA1be6407c71c6c332194e36b1fa9b6bcb318dadae6
SHA2562e4d4da9501c7d7837d0d79cffbde8ad175b122d0ddeafdd5ab15bcb5f936ab5
SHA51243912fd6da361bebc0017083d1380652d9c8887bffcdb1bb262aaaf19f4ea21a28b130cd4322899123d93617a71e25a8317a38ab79a83c56b31dd1385c78cf02
-
Filesize
1KB
MD5befb2bb65ce05fa53e695f8f4bff96f3
SHA18efb5ac479b7c2b43219eec5e6824b9a7ea2ede4
SHA2565268b0d495a37467d1436c7fcd79648f4414ff4a9dcdef1cc2888ba27703e2fd
SHA5127be091b538b55fed39610a5e741a0e42383fbda2f61901915db8bd59cf212a372f1feeebabad9bc14be42d244f33a5be1cf2108d6c250611b7c87891d7d6cb8a
-
Filesize
5KB
MD585909b18b0c3f2670b84ef498a0cc685
SHA1a876ac72e989cf0c0137f8fb5c56466c6644ec71
SHA2562b50b4a33d5cb8da32ab5615c41adb28b35d03cef2ee0e3d63756e8cba9df518
SHA5120b3ebb8d74fd8aaa75249ab88811b1992fd4e9b67fb1a3c468a9b550554fb2b212a6cd116892ab9ee694d1eedccb62c7b911ec48a4a5161248e70c8bcefc30ff
-
Filesize
7KB
MD5ba27484d11ce01769df1c49611469f35
SHA129ed13ca5b23a6e0451a41c910f52740f476454b
SHA256ea096be5f41696458a00903cdbf03b5cd806d3f51152e7a94c85e6966d4faa3e
SHA512b27eb401aa4bce43ffec82f01dee7e990245d08d570441ee346f8d9be2bae7e5633b69a60924cba3e7dd16c0f0c3c4bd87bc3b43722a59d5e0c43dab7e01c674
-
Filesize
7KB
MD554c8914faa864bdaa406591912a51860
SHA10b4b4c8d3b192dd52a1a727e29b935e795785396
SHA2563c925da753ede46594c28b94444fced6d8005306741d944c8028e37d4189554c
SHA5122327615e9d380883256c35deaa754360b1281987f84920e68d7b538e4e0c94e43117105825aa06b10dc01eafc2990fb230afcfb12396e1e2a0f7bcb0b0acd9c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5459ffda31da470d8db73decd3d6008b8
SHA1da5c8b9e49f2cb14350d696b8b0f9bf2d261c59c
SHA256d2843b4e50eaed2c026df983758833fe38919fc9931529ab1054d3f03295bc96
SHA512d70a5fc7f9b36819c239c7e973bbb272ed376675e10257eb4244e65f7b09681eeb7eb86f7cfb92a17cce4d28d4df85746ac5581bebc31e03eda0c965c48e2b57