Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 05:12
Behavioral task
behavioral1
Sample
JaffaCakes118_3e148e2dc12405e465507519e9620d89.html
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3e148e2dc12405e465507519e9620d89.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3e148e2dc12405e465507519e9620d89.html
-
Size
224KB
-
MD5
3e148e2dc12405e465507519e9620d89
-
SHA1
2bac5e8a8f3f544dd72e1d10d9dfce82f9cf7aaf
-
SHA256
09d705647791a318997b69c935a124ec9d251c3b5cf5b597210d2f5a4008de1b
-
SHA512
1e6f6cb367670bde3cc46b801b84e583ea5b9c31d4eed4b38a58c0e9777c3dacefb0df32393aafd4a2c247e0dee16b8c48a38d52f2c8a9c7710e373a831f0817
-
SSDEEP
3072:1HVodJhXRodJhcD9kf85UuD6z8QBTSMIlJFIe2D1ske885K3xvK4fZDoCPyqTWbF:oDH2l9bM9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 2292 msedge.exe 2292 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe 5136 msedge.exe 5136 msedge.exe 5136 msedge.exe 5136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 3496 2292 msedge.exe 85 PID 2292 wrote to memory of 3496 2292 msedge.exe 85 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 3792 2292 msedge.exe 86 PID 2292 wrote to memory of 4800 2292 msedge.exe 87 PID 2292 wrote to memory of 4800 2292 msedge.exe 87 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88 PID 2292 wrote to memory of 2832 2292 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e148e2dc12405e465507519e9620d89.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90d5146f8,0x7ff90d514708,0x7ff90d5147182⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,12984313113142465249,3129159369385910849,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fe6fb7ffeb0894d21284b11538e93bb4
SHA180c71bf18f3798129931b1781115bbef677f58f0
SHA256e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189
SHA5123a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b
-
Filesize
152B
MD51bed6483de34dd709e03fd3af839a76b
SHA13724a38c9e51fcce7955a59955d16bf68c083b92
SHA25637a42554c291f46995b2487d08d80d94cefe6c7fb3cb4ae9c7c5e515d6b5e596
SHA512264f6687ea8a8726b0000de1511b7b764b3d5a6f64946bb83a58effda42839e593de43865dafeeb89f5b78cc00d16f3979b417357fa2799ca0533bdf72f07fda
-
Filesize
20KB
MD5162b642946a24839c05530fb1e6059c9
SHA1077376b7a9f0305600a193d03f7efabbc2aaaed8
SHA25603c8a9d542b931ca3b2d6a9236ab3af3f4897171727eea729d75b1bfcbd472f2
SHA512fc77d2d1e7797f7586dce55e85046bd490c8821b8edef88a014ea5e7c5da22c258a9133e4fc303e134c2778e4005433f876e667c93187d399dcc1443695c3ac6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5030054a5bfa89e9363369ab1ab39cb71
SHA1ed7245493d8bb1c637aacd833fed35e34fbc4905
SHA2565a858ab44c3f92281932a2e3fd3661d32fe48715250052786912be4a9088cfa9
SHA512f104b59e2139a38d5b7036ac19a93affbb30c6e8a67e438094659eede3d7565b2793c4768284618e64feab2bf8af7199fef02d111fe72675f1fd59ea58e7fbb6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5fcca63749f0ca8e7a5b5b354e166dfbd
SHA165e8c34c5e397ad661e659bd5b5adb0080ec6d72
SHA256c431d6e88f8c1847878706c832b2859b9d7bbb6b1efee6af31804a2f05793b10
SHA51235186b9c8e99da0d8b9a075f5953a8d5cbb05b710fa2aceaf98d6bb942633f664163b5776e6594230c5ab6511e227d9858125da4c7cb8e6503d63274e69e5517
-
Filesize
1KB
MD55147ab85ac697b780a80acdc0b9a4839
SHA1f2f3a69055e64475956f73d9eea59e73b7103557
SHA256179d5c3e0ad89f9f56a97563fdd0101bdff6c38869216365415cd92b00d49279
SHA5124a57f0b66682ef8585928ad8c65491752edf9675e3a3066c18a159cea28ce9dec48f79359eb17720632ff7a985d36e3ca4060b1709b117f4c810cb6cb73970df
-
Filesize
1KB
MD58ef62826245ecc95f54ef8521b827364
SHA1ac214b69dca19a86df43b00983ed84d3abc34f07
SHA2566ed2920e9f0ce2243585a881ab25c65862ee8c7b0212de212dea72ea430e46a1
SHA512314f32abe2bfba7868f2533634b4fe3f4c03e985702d59853149f45198d27f77d10c0747698bb81ef6b34ff0be4ad7141e6dc2364f363502478c952199007fed
-
Filesize
5KB
MD52a4542873cd3420e2603b5c02c539079
SHA1552d3e6f9ea541a270a8999717a47b35e4d68245
SHA256dc981d65d30fb6038b21122bf38c55ff4aad8035964b29da95988aee5b36b0c3
SHA51250e346633d99f9e78f06d527a73d6002c33982eeee369baa00ba889d5a270dcfd2226b127e49a746db3d122e3109e1c53e592714b18bb6bff552f59bd1c8a213
-
Filesize
7KB
MD5a9a67d3b3c9974bbfd40146a48f5a6ca
SHA11a7957d856fd178b124d43fe066eb444812af7ea
SHA2566b8baf2f0e97a4d8f58caca6acd76857c2ce2e37f2a38cbd568daf1b05dd0da8
SHA5125b53fb00cf0d329c8754f3e8109c5461112d6e8dba7f803b8906793e3f687ef6fa4e922a652ba539e376446be6800cc94f04b6158667e5224748f8adff73ac0e
-
Filesize
6KB
MD55ed10255e727c5c4168249e8fd69369f
SHA16a69b2fa2a3bf3a9238e628b9a62939a3c8d87a6
SHA2568167ae7fa14f52155c528adaa3bee426086143bba206a8eeeae95210097dc10c
SHA512ab248a4c50697b352a003838fa5fe3230630dfe799536ad29c538e57fd0209d125eca76acafaf1d810cdc30f9ceda6d93ad50f60d4195261d254233b9221da89
-
Filesize
7KB
MD52d32b3d304b87a7f7ce91c54cbdc68b3
SHA144cd44507dbe180da63d94bae4b8c0ee66f8cf38
SHA25678783c951f970caa52f37386c1c4c48aa41352e88382cb3ac26a063d0018460b
SHA5123f8126ce426b6a86525e8610e3b2df2e8bec3af4200b8d83138f20a69470f0257c3c3dc57cd1165b47435738448fd562f30f3e774973ab1e5cd581c78980dc1e
-
Filesize
371B
MD5efb26cb087badc2fbeec1a0f8267ffb9
SHA1405cf495edde3cd01f24f5cd87a159e2cd6c7a19
SHA256f0fbafcb9ac58b8fa419d809747ec744a52e1b0a0f3c6812f878b257d89c89e2
SHA5121fb0e1954cd158e3af849bea06588cbfce781328de3b68b2bdd0bfbf3a1711cee5c37988199db2281661f959d94335993622a3905d228c3d6da528442ed25137
-
Filesize
371B
MD5cc07e5b4ba3bd518410c03999f5782be
SHA11a25a6c32a7c5d2cd4f21958c03deb279b75d06d
SHA256f131d67da22f3b48697c3d7b61c1b032fef0c97ad73e4c7c9abd2a00e15cd28d
SHA512f6771da4da791bcf18ffc26a58dfdea375b894861989725718f801be4d0202a66c64873912f8aba4755de5814ea88264ca38f680c7bc75284e84a343c2252910
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50ba5dfc882571f3fa3df4453f38ee865
SHA157d2967444b78bb66835640601d17f77c7900fc1
SHA256cc83504f7463f34bfdc4f34a4470e96f65a267b5fbab446a865c3e4a8ebb0542
SHA51278f659f6d9b4217b8177a3ff9d5c7b157c04aca53892abbd163f28bf188a935911f939b0711c2439e538240433b218cfdfde59043d7d0c22f235e5eaa0dc0711