Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
e204a5a2299a6b2fa64f34224d49dfd0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e204a5a2299a6b2fa64f34224d49dfd0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e204a5a2299a6b2fa64f34224d49dfd0_JaffaCakes118.html
-
Size
59KB
-
MD5
e204a5a2299a6b2fa64f34224d49dfd0
-
SHA1
528b93e4db330f18f6dfe64641367810b8a7508a
-
SHA256
fd40dcf88db6d17329302bcc8f7590f27748e4f13f782193f2aaafe4665c38d4
-
SHA512
e6f519a1494dcc388669fcd68ba349814c50694a45d37e9776c7ca1a484924724256b16bed04c131ef2a602af45717d749994562f37b006dce307ec67e4faac7
-
SSDEEP
768:5HT0EipBbKneuCC4OSd3XsOw+upvvMeGGJe0rmliSEq76hSN/29f21sUU:FTupBbKqD1dsOwtp3IGJePig6hCK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 4852 msedge.exe 4852 msedge.exe 5072 identity_helper.exe 5072 identity_helper.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 2276 4852 msedge.exe 83 PID 4852 wrote to memory of 2276 4852 msedge.exe 83 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 2564 4852 msedge.exe 84 PID 4852 wrote to memory of 1744 4852 msedge.exe 85 PID 4852 wrote to memory of 1744 4852 msedge.exe 85 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86 PID 4852 wrote to memory of 3348 4852 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e204a5a2299a6b2fa64f34224d49dfd0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91f3746f8,0x7ff91f374708,0x7ff91f3747182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6728 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,17402681742563559361,10442428837744953905,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:64
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD56308c0d2ba533d67ee63b554f47bd6a4
SHA16648979e5e2c83f4f604ed509ac1f5d00a2eb6b9
SHA256f69e02242ae38a259a3ffb13393e3bd013b0b305c5f40c4e37651fc75ee4ee38
SHA512acfe7ec2ffc410e3bbcd4422f3fce98040fa3df3c586a3d984b180a45e1b570161545648c85421bdeb10c7fb41747dffa092199e4e2724c370848e2b3e90f93a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d7529af23ce3c90e5540bb2a3d95f5e1
SHA1d309f90afa5cdff8d8287f4fde2e977177dacd83
SHA2568d55c518308f0b2f63a904c71e1f025f0b301d281c9b5238a7b8dee95cb9b50f
SHA512dd3ae6efe1eb7f299178c6f64757780f05dc17bc054287a90bfaa1f400aded4b2253a32d525ece704916ca8a7bdd4c6911e32ec99f71b2b321b4cdcc25691409
-
Filesize
2KB
MD5335be45880e8c42f6d3ac20740dff94f
SHA142e32595db5c77ab22beb667659d26f4663117b9
SHA256d5a8d4855f7a3ff4a03d1e31e7ffe2cf5428e52fd902c8ec1ef386b387ace3bc
SHA51274efc0cbd7d063dc10f50ec35adf0dc2d59851fa5e9a1cc1fc4aaf59af88878ff3aa74466ef17c43839ed98ed60843b9c323b1c7272efbd22f4031a5cc4bf271
-
Filesize
2KB
MD572e993a68e658ff7d0ec2493a17adca7
SHA14d1b396df8a38e8d1091bddbafd17e2fef85294f
SHA25634b2905cd25bc8802033bd5e1827a6a837d1fd998062028ee991a2e86362ac58
SHA512a4d5fadea8b66d7c6873d82ff6dd5e8508d7cde93083b00b2adaae523bf9cd6388b8c6188dfe3150844b84446d6f5fb0d99a64e7656eeec5a8b60745eeb285eb
-
Filesize
6KB
MD5d21049693f7aa27e6758d0e118d059ee
SHA1adf42b58795a2ed6be57623b6ebeb4d46fbcc036
SHA256b2bdc03fac05ffa8ec43dde46c44aaec704ec5038ff76ad0a1e78227b77f9d06
SHA512c0d659e6b987138e4910cd0e354b735963b9cf2552c6d57bfcb182945e4089fc3b365c87c38d03313bcede576dd199b3521e04e296851ea11bef927b29e0fb23
-
Filesize
5KB
MD528201ca722d266806885963505db29af
SHA1bedfb012d43767c2fcae6e2b549478d721bc1ae2
SHA2560a26150adacb7807c31f1f6e3902cc0b8447a6eda46bca6c374124d8ea90fdf3
SHA512075de12df8be58fd7b815f9cfde9b0bc13ff2a786da5de78f73bb5d86f26f1900540eba5e81e2d8204abe9fec9a694a6b303c4e6dc2843000b762ed64c85f684
-
Filesize
6KB
MD55ca78f6a7ea76e355b8306a07ebf2a2a
SHA16433b12dc2ef6f84b71f9b1dd42a3a9644dfcf40
SHA2562a49ff49710ea218e960b275cd0c1a3d8a12e75c9b8f8d302de32c8b9a1ca766
SHA512228b7aee953fdcbe4ad6eec62c1603bd17deab06ffb5d60fe7d8ac07dde24d91e344d592efef6b959606814255cb444ae82bac06c324f00b197b9f028e3fb712
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53bbdd2e2fe9425a58d1dca8a494f37c7
SHA1b9805ef479b308348bd202a9136a0ae2fad63029
SHA2563dd30101d89a7327c3058c9d09bcb53c3749dbd4cca493c263cba6f786da1ebb
SHA512aa98fc2813ca664ace252858ee5901aea6209abe4480d469158dbc58c22a0465eaf3c6d9d8bd063105cea420742892e53791a3400ad16fe5c0350afa2e7d382c