Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
14f0406679b9eedf1294107e8139590b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14f0406679b9eedf1294107e8139590b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14f0406679b9eedf1294107e8139590b_JaffaCakes118.html
-
Size
47KB
-
MD5
14f0406679b9eedf1294107e8139590b
-
SHA1
d5bd8068091729250dfde09afed426db48d8e6a7
-
SHA256
1f92a8159fb7babca322026eae08a5580973e924d2558d21df1a94b44fd57c42
-
SHA512
5e796d6387dda6a297503a5b6c1594b49a631faeecb307607108e51e49d2d83298bb509bacad8d36011697233623bd33f597df7bb8de5f2f0d27ac94ee8df98d
-
SSDEEP
768:/7GT0EipBeRkALduBX4oPrdJzHzmK+NwakqYbLNVE2fFX:/iTupBeRkALMX4oPhJzHzENwaNYbxVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3832 msedge.exe 3832 msedge.exe 3472 msedge.exe 3472 msedge.exe 4720 identity_helper.exe 4720 identity_helper.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3260 3472 msedge.exe 82 PID 3472 wrote to memory of 3260 3472 msedge.exe 82 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 1236 3472 msedge.exe 83 PID 3472 wrote to memory of 3832 3472 msedge.exe 84 PID 3472 wrote to memory of 3832 3472 msedge.exe 84 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85 PID 3472 wrote to memory of 532 3472 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\14f0406679b9eedf1294107e8139590b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87df646f8,0x7ff87df64708,0x7ff87df647182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1480 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7048 /prefetch:82⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16256734478414373617,9747981775962712225,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5af57d823ef5635e858fe3b242d181168
SHA11d835abaa1814c6b258ab348829bfac7429e84a5
SHA25657e242cf057163b143714216ead7336ec961326dfebc05e7fc2fb4f93b74aea5
SHA512b25b0bf8b35d09d98e7fa2d61e710dc4b41e590e812a5ddb95fa84fcecb37e147f1e5c288a20846a9355400473b587d841d82daa8aac60a862a781e7102554bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD57de9eea17af981171dab2feafc0713ae
SHA10ac870b85d821b6169e0e5f90aed2b869bdc2de4
SHA256f33c1b74345212cbb3a871826708de86c080143cde76b10e26d563cfed5f0e5b
SHA512ebd640910ae3780051abe1a0a5f6b767c29966edf81e23c0a03fb0fe5f1dcbcfd4e9119d0d02c34fc3624803c46cfdd8ccb634611d13cfa50001699a03bbbef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD57418a238512c0224e23a23cf2d53bdc7
SHA1efa0fce82d269c88d1a5b7712d6cd3dddf296a6a
SHA256d8ab98d75fc04fb8205308adc685ffb7ea9ce08c3831409e825946f7b3084d48
SHA51208bbcb86ead22a8f84b3bb1f340b538ad7f418c4deee133479ff73ee967ac89439046755e18b7d4a9ddc0845b979d2a3f59434a6a761e6ec1753d2bca47288e0
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD53816a9c239f0e36125ce730107171747
SHA17126b72412b99b605aea0f9195bf6c32c89856a6
SHA256072cb4ff87d6059b4e13d70d86b16033f0db48a2d55b6a54f6a2c37fc370ee2b
SHA51265d51d645401bb385bf7ea2c69a5ceaf8a2614d4ece18125d753a425cac04f52ea4ef7d6e1ec299c3df22fd1825ffd8b598c25501fdb765f5f81f91a73e62c16
-
Filesize
2KB
MD52ab6acbd571b824f8d7ced70b3df18d4
SHA187b8de3b53a3bcd73e6e2ca566e3e18920f38051
SHA256da6f15d51e4bf40fab4fbd90c08762ed340370ad5141c5d038273cb8a037d762
SHA512948971e7ff5817d50354268f302a2e569359631832410eb638c036b6e5591e63fcd5031d3930690e6d7e1550f0f9758e4932f7eeb379e4d2565c31205c97102a
-
Filesize
5KB
MD5d8a492b7c02a45cea73761e20c87e1fb
SHA107225ec83715d9f2a8b989f6a1f804f1dfe1cd01
SHA256e8a432c81866089c990ffd82f6a18139fde10370e36e28a679a815cadceb5c08
SHA51231d6ac7a19112ad1d889adeca8992389f9a8114604a17ab88c92c68b8cd8d308ec288604b0f57196bb81e51e418f1a4bb3ab15372954a92b8e6b4559dbdbd2fe
-
Filesize
6KB
MD5926beb00dd6673a587f05c66db51231e
SHA1ba4edcb2a066eb8ffdca50956945917b5883fdf2
SHA25652da21e76f830d052b247e25238508b6f596337cf8d5f3b187389775d2a81871
SHA5124d09bc10ae444cf2461f74f179db8016288b01d01b7052252310bc16d6048a81f03b7822143f854dcdc425e85b837f2a65fb853225a04739dcbf9304e77eb016
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58c62cbdafe09cd1da158c1b19632cd68
SHA170cd9db4e8625902766492769ecb1b004cfade63
SHA25602e281afe83e6474994955a0f6b2bdb97f42b129dc9477b6e11274347efe88b4
SHA512ce3787338d18065486ae62e727653c771aa02211ad9354b7e49f4e77fbf42dc3069662eec51948ef97b0d8e50f4fa2bcfe94365d7312558d88ef474bf1eae742