Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
978651ae707fb0d8a52fa92730aefe3d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
978651ae707fb0d8a52fa92730aefe3d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
978651ae707fb0d8a52fa92730aefe3d_JaffaCakes118.html
-
Size
135KB
-
MD5
978651ae707fb0d8a52fa92730aefe3d
-
SHA1
35b2f0c78e305024c30cba935e4f3394ef378c34
-
SHA256
b0c6c39b02b55f082bd0f90a819d32c29c1a19e1ed7746173971d61d90754c66
-
SHA512
f82f894e4835dfd89b3f9cc3f7bd14b73f7b8498c192a591b3971b0354fbce5642c0a6b0babfc4709c3e07dbdb5ffeeb11957483c1da8f33a5de88c730b0f2ce
-
SSDEEP
3072:HI0x9mzClwr0yPVx+eqI5+1DqiHCw8tDZfSa:Tx9m70yPVx+eN5gK
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 sites.google.com 36 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 4124 msedge.exe 4124 msedge.exe 876 identity_helper.exe 876 identity_helper.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 5008 4124 msedge.exe 83 PID 4124 wrote to memory of 5008 4124 msedge.exe 83 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 2052 4124 msedge.exe 84 PID 4124 wrote to memory of 1940 4124 msedge.exe 85 PID 4124 wrote to memory of 1940 4124 msedge.exe 85 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86 PID 4124 wrote to memory of 628 4124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\978651ae707fb0d8a52fa92730aefe3d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa14a546f8,0x7ffa14a54708,0x7ffa14a547182⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6580 /prefetch:82⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17352738650749407499,14305020900256483228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
20KB
MD54b3121a05808b99aa6e0cc12924f77db
SHA1ee5805bb76c384d1e1667aea2976bd2f4f94c7cc
SHA256e4fea32bac89d9ad34b13a25b0b4da1321920b2c6be2cabb75ff91bf6109152c
SHA5129b83d55691b41d2a45a542d163c1b6a47208969720ec1fd15233f29ddcef2243e79895cfcb008767f91b3d1cf3a6288248e8b1ec50027eb96db04cde56cb2605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD56d535714d7199cb925bb5d132c6a1703
SHA11d83099a36dc983096327dbf6219590a3ef2f180
SHA2563c5280abfb094de37f0bba8d7427c16e393be20fa56d21ccacc9e75b19d474d0
SHA512bb33a37cabf99b61672d018f5d6b6220a15afc739af1ca15c8c7c9389859cf229db62967d4f114f639151954ae66789e2181ee62e1b371f39e1bf2e446035095
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD53df03cf9086d59a638ae3373bf822e98
SHA1450f9beaa512d6a6a87e5a272ad025f1bb18e53d
SHA2565e7fb6a289bd07c2ac86d4aaf14c2a510704692c05cf1599abb724fbe5e6ff30
SHA5129e26cbcd7ac3da31c6f79cfabf7d35bbf7a346152dce3386cdea893cc3bcdf2170688d0b7f7b1f0ed042321cadb81e8fba80da2afeeda2d57095113ebe7a0754
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ddd2e7fb48afcc8b0936bce9aab8b2e7
SHA102934a98e999d8f3938a34808485352f7687f63a
SHA2569eac213ce7fe1ad62b3d66af7dc2ace1784fd9b0150f9a3cb2f418db2b753622
SHA512a2079224471ec9dc739e3b556a1262214ba40021609ac8fb6498824199b3671d56842f15a2739091c7425e2aa2417460e04a0ec73d332388fe44b61b8eb7497c
-
Filesize
3KB
MD58ee50e306a9288ced9b827bbbc8ed29e
SHA111b320444041194892b1dc601e483fcfcfae014a
SHA2561aac594aef256070f1baf005c7b47ea3629fc83e596f3c48afdb5903eda300b0
SHA51262679383167d1e13d344d1e293f64178632b8995caa38da766b0cba8eb1d9eb84b727443f25999785aa78077f3a5cb81296dd1e8f52aea30a0499f8b745515b2
-
Filesize
3KB
MD52439ddc3cf5c848ef82e68972ef32a3f
SHA1e0575d5565a4cb7580e78184fe60892f9d358560
SHA256b2743a69e6b1e70b86d244fe2f04de92a39cc9c112468c89d4de229c77a45352
SHA5129f7d797625ee558cf907f2f97e6f8c6ec39809547561891da13670e4dc5fa1fbeb0306f44131ef30a6dad0a25fc77c83f6a3106fcf7620fc3723b122818d0e51
-
Filesize
7KB
MD57d272a335246acc0de7b3f472e57ff70
SHA1663655d585529b17325d8760ddf3431d57fbb5e7
SHA25687bb5ee7d52d1a07c48d0825da0cf969a63b71ce3c0889efd3f11123b022910a
SHA512aff180e1bb1ed2f872f46961e435d05359ad88ff4afc8bda1870097e67cf2e6084093bb4e0885c9df3c63838c6619e6b954f7c8a1daffff093ec11246ac7a8ab
-
Filesize
5KB
MD5fea8eb78323d42ff5efde5646081ef9b
SHA13d047c7fbdbb89801510a68b11043906838c2b1c
SHA256cd43e903f1d5c2b8a71350f95af5f657869a427993b778c23a1d9f78d22236a5
SHA5120f97b810691a68d3a82064dddf39fa2e863cf32ba1d46af2b446b3f9befcb3d4d619313b3f62cd4c18c547f532977d119064c48d1cb77d57d64b30e49510a8ac
-
Filesize
6KB
MD5093a10d45b30ebb17ab3a6f29c3855fd
SHA19772a27a90ec044404f0eb6797d44473da2b565b
SHA256fdccf1a14e842f598625700c61306b396dfbba0219e81f60ae4caefc51739d85
SHA512f61df27a33c205f7ba572c64cc4ca13237719163886669630c8b8ad9a054aae3d69f766073ea626ce60c5811ab4c636916a41f4bc11113feaca64cf94d4bc8a0
-
Filesize
7KB
MD5885490150ac4b52149caec2963e3b554
SHA1c1aeac45280b7263bfd4819f84e95dd6f15d4640
SHA256c07930d2ea27f0862c255b1f427fa50ac077feb701301e2d5452040ac9f1b386
SHA512cfdcc91a0e1356907f0047d2ee1371abb835bfeacdcfb98b00ddbfb982f7f6ccc41dfaa382d80a159a32001928cbdacdd91365c93887fa1f53c9881deda07369
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5749c4635ede17a0b87bfb3c861d06db8
SHA142181b8032b99b936cbbd8e327cee20bd5472a30
SHA256f44fc9c0add41751b0c7a4624722f91c4ba68314ee3632d2743091524b1dc896
SHA5128cfe11f41e6a9332f71902472dad44e675447f448d520611640b4fa362177d7eec77ef42e34ae9d7a72c15a75fd17f605518a5e2e469dca7e286e8340997bbe0