Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
df38fee0d8e431bad0765d6c37b4c7e6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df38fee0d8e431bad0765d6c37b4c7e6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df38fee0d8e431bad0765d6c37b4c7e6_JaffaCakes118.html
-
Size
45KB
-
MD5
df38fee0d8e431bad0765d6c37b4c7e6
-
SHA1
9058bbd8b73dad10f27b1221985c5578165d3a6a
-
SHA256
552b258f0a3dea9f1b203ee59678b376a509aa7f4c2bbab31465494f24b76790
-
SHA512
cbc0f77a9df936799e45f440cb4440a325d2380dc6e97fb258a3ef413d4b7a9df6eb84cf665a864c5aaed14d962faba6b77f043cc9ed2d23c240965ec364a97b
-
SSDEEP
768:/ql4Hse0SKlpfcvfbkwtfWE9toVvsyXPyrwvXJN8FORtzPp16oWeNoQzJGHjqN5M:yWHse0SsfcvfbkwtfWE9toVvsyXPyrwq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 4828 msedge.exe 4828 msedge.exe 800 identity_helper.exe 800 identity_helper.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe 5220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3856 4828 msedge.exe 86 PID 4828 wrote to memory of 3856 4828 msedge.exe 86 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 212 4828 msedge.exe 87 PID 4828 wrote to memory of 1740 4828 msedge.exe 88 PID 4828 wrote to memory of 1740 4828 msedge.exe 88 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89 PID 4828 wrote to memory of 1244 4828 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df38fee0d8e431bad0765d6c37b4c7e6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,8319366093262393363,14825225640467561150,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:5360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c1f42d7d88fca4369044c66659d8ad7a
SHA1cd80d0f899554f2e626962a567bf2864123c070d
SHA2563e361c721660e1ebd4318cbf0f197253e4b07048c49baa165f744d97cead1748
SHA512ee6bd262737f6850c47e87d4276bcdf03a51ab9dae5024672c21c5c35be2ce2871e29071162ab6710f8f45f5a1bfde63e2f6e7a4439eecec1ea9d2f202e7fc4a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a417405a88633f395db46bf9bb3640a4
SHA1efde4bc276eb8c11ea6756b7f9e9eb5e94f2dcf4
SHA256f5417b9cbc6e087238c6e02f82c34fb7e5445460957f1f499298fb2faf8dcc40
SHA5120ec3544b1ed201805c49500d81fc4bcaf00a4de4c76b450d236a9e84aff03db0c0d6bf2702de1589cbf3a1fc06f12d539276641c519d64953ed25993b20fd1bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b8c2a1d053c0d22515a5d7f01a3efc08
SHA1d2f18da077b95150f1f7af296df17807b567f60a
SHA2566400a85e5e213f4d4fd4d55b1ba9d8df9ca263e6c6c4db721cd5b30a7ce628da
SHA512980581fd3f902953d5be0a83e7a462561cf880f8119ae5440da8866e5e3ce1d56f135c86350486e055cac1a53c7097d06ab88309c6454591f4f4551df88ec9a9
-
Filesize
2KB
MD5689a98ae91900199a9774e3ea9cf1f1f
SHA19d4e73074bbf34eb92dabdc5c74a8a2735bef2eb
SHA256ca67d04628aca6447381f3a22458a2b3466182fda6e41d57b8471e044ee1200b
SHA5126cf608f85e89c7c0e277d92f55b6040d1f68b66488c8d499cb480e7bba7ea1b872f87958bcb57b33a82f3ba90525fa6a9e4648fb207c6c249a940cac3662f888
-
Filesize
8KB
MD5cda32929ed8b6dcb6093a0eea170e4a7
SHA133e3fdf3832254c8b8f8c837720111a6a3ca8bbb
SHA256c06ab60a3ededd5bec1e2e6cfd19492a96023c5319b4e864a92f2ec7591d98f8
SHA512ea00aac41ac5da8055062d42a0ab75f824271cd0543633180f3f0662fc8250620c5aeb1dfda03828b27621d15a21923b4ff2fbe6f960ae7f06d3703c70f02ee4
-
Filesize
6KB
MD5281ab1e23ad652aa42d0b66cc0329cc9
SHA18f3b60106399d9098deb55d5a6beb3caa1167e78
SHA256e713f036fac2563d2c6915cc4ffe7e51f35d0ac0e4ea9b231ef6f52d3571f762
SHA512b75ff2381562d47de1d51e87c5f451ef36e7e925ddc7ab9d997e676d79058b2456f02bda97d40f5725fa7e32f051e45bc3637aa40ec468ac55c2027c96fa6b24
-
Filesize
7KB
MD5d72e11a8f21f3b96d13d9782d87bcbf7
SHA199da8f331b694b6c1c000a2c983573a86eb3ac7e
SHA2566b2249ad53836288ececfeb209b322032b4fa7ac6f8e30b0972bb782553db451
SHA512db67d7489c6061d73556cc0fc487a7abc1156fee58259d0acf7f52b7ec53c165ed00ad7671999416913e999b8b1b856b0ed109a623ffebc9d315651c4fae33bd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ae0b9a9db631a23b3714ecd7fc87e9f1
SHA106d196152b49bb9624a00c25e5c93aed5567780f
SHA256086665562f15f3a38f4c1c6519a457f347b157657737c7e8291ba725a7bdfa03
SHA51270acbc3b73fda578c3fef798e7b44fa11f30261d015f22b5c45b26b0859bd6d1cf92ab1756870a9c2e701d817146ba9f5b5ec4c9aa50b75269d1ca4c62034ed4