Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
fee35ebdf34bb3baa0dcc2cf723897e0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fee35ebdf34bb3baa0dcc2cf723897e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fee35ebdf34bb3baa0dcc2cf723897e0_JaffaCakes118.html
-
Size
133KB
-
MD5
fee35ebdf34bb3baa0dcc2cf723897e0
-
SHA1
994b00f9df7ee9f81b7f8fe63b4da23f0d5c4280
-
SHA256
f78772ea08d3d3ceac1f4a9d051b235a17f218b3877414863076f78937539ed5
-
SHA512
cd0bd1e3bfe0fdd36ff073530729db11edcae37b12c8279be1e5202ce4b8dd3aa249db5583e86fd83e97e0fbf782caae6787430837fe30432cacca9f84d185ae
-
SSDEEP
3072:CmQ/tUcjvG8rMUcXmNRS7gsMNrij2E4MDo9rCX7Ce3sNyPt5z:CNGXmNRBNriAK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 5088 msedge.exe 5088 msedge.exe 1308 identity_helper.exe 1308 identity_helper.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3700 5088 msedge.exe 82 PID 5088 wrote to memory of 3700 5088 msedge.exe 82 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2996 5088 msedge.exe 83 PID 5088 wrote to memory of 2484 5088 msedge.exe 84 PID 5088 wrote to memory of 2484 5088 msedge.exe 84 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85 PID 5088 wrote to memory of 2708 5088 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fee35ebdf34bb3baa0dcc2cf723897e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe955646f8,0x7ffe95564708,0x7ffe955647182⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,606156423914550015,10912222016561992873,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD51179777047beb2002c6749ff786f3991
SHA1345f6eb5f73dd45488bef23736a9218b47d3f03e
SHA2565f18411e3ce116d2fa87a2d883a393f137bdd22372e11ecb223e1afed2424cbb
SHA51273820c3e2323fd3f3b934ad2ae9ac9f49fd8287b1455d754f1a45c94c4c36682266bbd6c65657fe071b4661f815722ecb3d9b69f26fd15513fa41c695857d9f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD588d1be84ec88fd477ab96f3113b36e2f
SHA167e631e3e9824c0c66328f314833ffb823ce87ee
SHA256df2b7b47c7ab414af77ea81ccec278c0dbb05fc62c9b4595fba0ae1c0c5d4f01
SHA5122f576f6b28a8000153c893ff79e051b697b77aadf0880da9a473f9cce4f2daff53623dc28c9ffd8d8ed56e040b3ab3a2ab65e703c6905c9ccb22cf05f6f16708
-
Filesize
2KB
MD52e119f8fb419133d4c633848f331ccee
SHA1760a295e70bd864f5d37e3b9fa9502df72d01a3e
SHA256e6cd9e787714d0ef219301b3d09bbf458ca14a456bd76b22271671224ce4fb17
SHA51283a1ef2d3fe49ac8ff6239efcb434d382bfce5022e1d00dfdea7e56fc91c21413eea6f02d4050f84ea559f99b6677bf3e4493dfe65a84f6c844f6a65fdf53426
-
Filesize
7KB
MD5968840c55f3710130f626284ddf219af
SHA146b6cdf95b52aa8c8e33df25a3ffd89cf80fe838
SHA256559c24ecd35b3384d9430bb7201170ad1fad9fbf5554f7faf5dde9f7febd0a33
SHA512397772cf9a7e06054731b6a20d48f1f760c43366aff298cf87973dc55481078e1102027016062164e4c3465e6bffbe379c5fd3fddf5be734b261e9a7e6455bc1
-
Filesize
5KB
MD517e6f571eeae500ef4e90b8da59ccd16
SHA12a10b7ec2787d1c9514dfdc0385b4808d22fbc9a
SHA2562efdd5f97c36f398455164707b529505ac236cf6bbce32ec0c1273becb7928a5
SHA5124e111999a43c25ea9b268b86957f82b510de0e144e6b019bfc4935c23d17228b90ed90ac87eb682d2c84d9fbcbea309fa335504717f1dbf5d1ecf83722e40e1e
-
Filesize
6KB
MD53e8c77a31471e394f54e9e26b3e7a7a7
SHA17456eaa4cf8efde8ebbe23578c76399117f7b39c
SHA25691ccc560a714bddd0b2d797a1eb30f24679708e3942bb8dd504773e47acf87a0
SHA5128d7766daf048c24ed9362d3cd22c432c99fc3f5265436f40f916aae96deff6e45e047276cf66691fb2ad82ede0e575289a3b877995709e6fd51b6d6957e48b10
-
Filesize
7KB
MD558a2ed749e783b08cb5de1881d345ca0
SHA139666b38fd8af370628334a48d6cb5c2808d489c
SHA2562de0f6c5b36f89e454d7ec716edd3e897d9189375d61af72695ba061452d7844
SHA512d53e9830e0d171d017612c029d0fbeae26a3349ba5390055d56b0c68115d2ffc804064541fd31efaf63e46d795b2ec814e395e6db3eb13a0cca0aab8751a1041
-
Filesize
6KB
MD572022270e690264ac7bf29084455ff32
SHA131fed4effe1ae977fffea2e7f03c6b71b976f185
SHA25695b94839f2710233b92bceba1ed8b3267172d397cfbfe1f17c4f796bd20032fd
SHA512be9cf16905416e05c68146ccbd4699aa3971ca94e19fb53de0600b2bd9ea98017d8d0d2c1a209b67ceada7bba5060b4b2de8fde047a01d08dc82597991a74b06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57d7595927f7d4e4f225e20aa6765a435
SHA10119ed45d1ea5d3ffef2fce441ac0712201cef36
SHA2567117021ea944dea6067a3e3d6a4d40ef620be69a4b17688667cc340b537f0f35
SHA5123e97f705c6266f40ad34699bb3b666bb43259608477831a31565c06a0d7eceea15c1055f6bd04f1ea7521db918621d9ec206af0aeae966963c54b51eecb52a5a