Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
f50bd7f9a937a875a9cc011b41b46b97_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f50bd7f9a937a875a9cc011b41b46b97_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f50bd7f9a937a875a9cc011b41b46b97_JaffaCakes118.html
-
Size
106KB
-
MD5
f50bd7f9a937a875a9cc011b41b46b97
-
SHA1
9b5efea7eb6eb8cdca7c207546352907c45412dd
-
SHA256
b2e83fb2420e39a15a490e3474ee470ce905802c830cd779f34ae7399b3b3f39
-
SHA512
925d667c157db41e5fb3db38be567604afe26b75959cb4f8fb4b8f6f0ce49d2b1b19e71f3b6bee7ab06385de1ed129e3c74f4c66d5e4590c447e21b3059acfc4
-
SSDEEP
3072:t8T0/xuAAoUgQnC3PHe4B/ynrrfhkcHNJPEh:d/xuAAoUgj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 3968 msedge.exe 3968 msedge.exe 3228 identity_helper.exe 3228 identity_helper.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 4752 3968 msedge.exe 82 PID 3968 wrote to memory of 4752 3968 msedge.exe 82 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 1256 3968 msedge.exe 83 PID 3968 wrote to memory of 4536 3968 msedge.exe 84 PID 3968 wrote to memory of 4536 3968 msedge.exe 84 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85 PID 3968 wrote to memory of 1848 3968 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f50bd7f9a937a875a9cc011b41b46b97_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe899d46f8,0x7ffe899d4708,0x7ffe899d47182⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1896 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1852 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1824 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,4989828449243431540,8556682170713850737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5fef58eb65fdbbeebcabba59fa731810c
SHA18a0f4fa42f7a4a31f1802b96fafbb0a0778cd1f9
SHA2566c4304d6e966f3d1eef786997d1458fb80e395748ecd437c2549954847097738
SHA512a3f72bb765828151e895d92d08d2a97abe765c76d7dc8b5284e275d7453fade7eb379d5bf93234cedba125bfc2e270c35a51dd274a24b6fb941d5918793547a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD584f4c46141b7681a0c895c30e8bf2465
SHA15858a7f03d91a6105c98bd9e32a68e9329adcbe3
SHA2564ec1b37b7d63824b2b70126bf95d21ee1da0bf9c21fe5c16663f58cbbe8fb9c2
SHA512086f22788557fa4d2c9834018cd07221c1387b815ea8c970637491a1271692cfaee06a7c871ed1ddcc53147b8a460c9831677da3d270a4b45b06889403a32971
-
Filesize
1KB
MD5e9bd7dabd7d208c41d7dee925f03b5ad
SHA1918d795e9573cac4e5d5545b4a939517c3d15df2
SHA25647f66e251b0f732eac678c6c05c970d89ac69b18395ec04fa3b44a0fa266c0f0
SHA512db070059453eea9858750289447f6fc0dcb8dec1ba6da73855bde6bddfd73ad6b862058cfafa0abc7a434334cd6be5e14f58080eff5208676a27f5780435a45f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD52025c9b37a47102d99bd561bebcacc58
SHA1191628d69a69bcfe87c77adf80824e5dd10250d1
SHA256653a71a7b3539b60f4c106498cbf5b0f0b77b7203f8768ac361d223fb05dc8b4
SHA5126f2b8f968ff814fc4dacddd3bbccf5e70dbf696d2da4ea9d01ebc27404c2df7c2ba5e4e9c1a210b882243bad7ee97275a3125bccd0b2d0ac5330f984c54a9259
-
Filesize
6KB
MD5b3659baaeff9f31e78bab12bd921b695
SHA1f1db2c5367128cbfb99e79a4fefbc35d0b63280d
SHA25632048af825c4fb4cb6bd4bb8b77e496347a6342542212eb21071bea2767b41d0
SHA512052a11dc3f894cc5088667911f593a1be6b764d6aa46333c9622175720d88470b54aacc7aac0824e0d2a9cf65428afac5b7b6830738c1e5c02157a3de885930a
-
Filesize
6KB
MD57815b75e1aed6720fce4ccf4c5e899c3
SHA17ffb7fffe9e13496d1b3dead3c4666d19ceeac0d
SHA256ec45d7bd5c801258693eaa1c3d012f3984881d583028c10c4f6fd48eb8872857
SHA512eb57646ba35721fcbe264b9ac9fb44b9363e0da4e13bc17c64b2864254ba0f00b5a1301912888e8385e25c273eab08233aba86acebc01bb68b01a2bf1c973351
-
Filesize
6KB
MD5aa8bd76d11780ebae434de65ee294d34
SHA1062a575512422f28ff5b9fc07a532d38c51b6e4e
SHA256841f37eaed8438911d08721c6b3de87751f5a2893af1add31734e67b4304807e
SHA51291af7df0cf2a26fd6de9adcb5a148e636fa1c622afe510a60e8fa9827d4d163efc6f23b83a89b4fa0ab4fcc83c0c02b4ad793902a16284f595331759994365b8
-
Filesize
371B
MD50ef717051e1b414af8d1263aed3a2b3e
SHA1115dffe518cc6bc6ce0b5b556b7ddafe99c470e8
SHA2563faa3106a01304160652eacfaa86ccfc58da3bcfd195be2b29969e8d29357bad
SHA512965da10df7b6411c2745470f764970f7580be4fda6460ac5559ac02904f6b370f3bc854ee8f6c9e3f64ef2b34e14e126065e61e0831a1f8e14273216d320d548
-
Filesize
539B
MD56f17e3e075e22287d3023b18a9f808c8
SHA16241bae463845f62fab5088889d8d2269307fe8a
SHA2567e00234f17899780373dd434ee90024f894f8db22058283abaf1385055bb6a22
SHA5121503690ef3872bd3d9cc07be53e1c11adec2e9c22fdb9f7933a2eb7d06e9569e08a7908184bc0d1c17f3d5a4f3a900efab5aea1df10b865fab8b19465f803139
-
Filesize
204B
MD5ed3227aac8e92d628b1a2b8b61ef16f5
SHA12e457ffbfed60e047459b5cbeeeb46f0863e13c5
SHA2560c26511a1f3976a4fdf474ae8a6de5fa4c597678a0a2ccf23f3fa13c26649358
SHA5124b119d47772a5b718acee309d93d84cb14ab9af0eafc662e3fde7adc6f1053606a8df9e54df2118eff8f413a428bae66ac8b2e0f4306ed31c48a270144f0c9f3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD516c931489e8bc745c761159c149c39ff
SHA1693730f3f87299fc3b26a4fa67a6d0f9d478f373
SHA256d6345b7ed041e76a14cd998df0389e72a546941e1d5f26e985c3c032eecc9031
SHA51246d00611cbb96e21ec3dbc72a1cc0d7893193bd82e102ef922ea23a8909cc104e06dd662d665804da6586646c74234974e18fb72f0ae440d82dbfb2fb6f97b99