Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe
-
Size
1014KB
-
MD5
7341ca82446f36bb3b35c5b54eb4f3af
-
SHA1
82a1a522091de9c10b2c704d987c917adffb4848
-
SHA256
508bf4b3e54c5650c1cfcf2a4c5e0e7f4d88810509d7c2be72e286689b193683
-
SHA512
f186120017d2b168d9d90c7535f2342bd1afee0c6ce3d54716904142d5fdd21bb0a7d31900881b075f4416470520114f80b721b7d20363482b4d08a8e3c5dac1
-
SSDEEP
24576:XyIAthWCdFF9cjKgoU9mEnAHHws4f95RrTMmPEMP:XyHtLpgoQbdT7Ea
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp -
Loads dropped DLL 7 IoCs
pid Process 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 2228 msedge.exe 2228 msedge.exe 4796 msedge.exe 4796 msedge.exe 3724 identity_helper.exe 3724 identity_helper.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1032 4344 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe 82 PID 4344 wrote to memory of 1032 4344 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe 82 PID 4344 wrote to memory of 1032 4344 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe 82 PID 1032 wrote to memory of 4796 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 85 PID 1032 wrote to memory of 4796 1032 7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp 85 PID 4796 wrote to memory of 2744 4796 msedge.exe 86 PID 4796 wrote to memory of 2744 4796 msedge.exe 86 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 3312 4796 msedge.exe 87 PID 4796 wrote to memory of 2228 4796 msedge.exe 88 PID 4796 wrote to memory of 2228 4796 msedge.exe 88 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89 PID 4796 wrote to memory of 2480 4796 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\is-9GT60.tmp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-9GT60.tmp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp" /SL5="$70170,712548,242688,C:\Users\Admin\AppData\Local\Temp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://thebestoffersintheweb.com/redirect/57a764d042bf8/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc0446f8,0x7ffcfc044708,0x7ffcfc0447184⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:24⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:84⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:14⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:14⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:14⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:84⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:14⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:14⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:14⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:14⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5732361ba70a2791b255aa75ea038bdd2
SHA160c52b70b99bf2a530df899e7cd294947af761e1
SHA2564acc0f5c2eb50b9f99a7b588fc4814daf3aafa4af16390648665c2f950b3a8ca
SHA51255508b4b9211e94fc6f1ace57f300494c0de56780cc3c5d5c66a7166cd14f279226d1b54836cb6f8bc31be7088a9dc77a7a830c9e3d7bfce10c2031831af8b71
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5829b319b786d11fadbdef51a869aab8a
SHA1671d70a0436536c2a704fc7399b57bb4eabcb2b1
SHA256d2e63cb941ddc59fa5b4d4ffc50bb00da2b1bfc34ef9f92b1739f7932ee36cf9
SHA51212d3de6e0a7dc0e42855bb0d577557dd7ed745d6826d5f7d94dda008621fe9fbd2f32178474273df389b69812f04ffc2db0ccfb48b28e8a9313f42331f32e63e
-
Filesize
680B
MD5962aa000ec529b5744a956903146110d
SHA139665973c0e81b5efb0d65dc6ad65e95783a6795
SHA2564934954c0f48ebfcd2338f25b703c25722664e4de2e8296262983e60eac57a96
SHA512ff1fff00539db8cd18cebc3f7634c23365d72ac7c5e638d794eea96d0f1a6fb3df1129d3ecddbfde7322f0ef83ef1de02d085800b1546aa01cce5f1f2f61b943
-
Filesize
5KB
MD559cab04fd271d0a1fbbf8134ed6261f0
SHA141ab48aa0683076c4cb4890c293892c76b5078f7
SHA25689c7824f18ac34f33467846a5cc4ebcd018cf421bbfeb8af9b7e75e605ba848e
SHA512f84484d78064561b4ccc18e5cadf3c3739ef4d2ce2d4d844f520a7f5a569dd998d2f2e8b0a5105deb0fd63e6db8ee5ab636037b4c30ff79d569e67dce8d3141e
-
Filesize
6KB
MD5aa54740b86bae3ee9341c695b9f09d1d
SHA139021891f24b4bcf6db5140418bbd9f3b8571862
SHA256555d818ad872262ae6a1ca0d8756e38d126bad8138a3787dc0058c58b30e9ca4
SHA512c8857eef7714f6dbccdc84b8b6a01caab989eedd91eff000d500147125d6c813f60e671b1f6f43470d46b0a6e0b4798f8545e8c3493162d9dc532b55f370eb89
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5024d7e28a684f37154958ea567a37926
SHA12c19426592e77e2eb8d8db731a6fc4269a41eda8
SHA256a553f6e2f3f572de18ed77b2b26bded0ce2c59e3dc522eafd5602ce1bfd31028
SHA512f948d586c243b71598989a8be1ce740af0cb9b9b6b00138e9eae033036e3a6f4ec5bf5ab8c006a441772c14c04429f95c6a877bfe20b7a8169f4bdec78480390
-
Filesize
882KB
MD51c3c22290c0994070ff675ae9417e807
SHA17070cc4f6311b379820fdf6edcbc98f8ad1bd4f1
SHA2565acf67f9dfdf0fc1ca934e9cc1096e96cf95e325341e99482badd2d49be8685b
SHA5123792d52851202866e7fa51bc496a672e337a96beaed4010946bcaf5cff30afd18339867ebff3c7a78be01747ea0e3b07528d9befbad75885547ba4185d6f52fe
-
Filesize
29KB
MD5fd4743e2a51dd8e0d44f96eae1853226
SHA1646cef384e949aaf61e6d0b243d8d84ab04e79b7
SHA2566535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b
SHA5124587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d
-
Filesize
216KB
MD5b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
Filesize
198KB
MD56ac939f80346082a2f34774953fd3dcb
SHA10c66ecb9110cc5d4c9c833f3b3ad35aed2c4b8ca
SHA256dfd62d0755555778583f86521a6806c2e4053c5f282287c149183123085798d8
SHA512660248bff3048ac43363eeff63eea93287017a2dc60bb9744764e777b40bcac20d522bc77c0a2060d4737a1244338019864a6e22215942e5ddd0f84843a03c59
-
Filesize
42KB
MD5d726d1db6c265703dcd79b29adc63f86
SHA1f471234fa142c8ece647122095f7ff8ea87cf423
SHA2560afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692
SHA5128cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4