Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
333bd0832d2360d321672c9686256155_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
333bd0832d2360d321672c9686256155_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
333bd0832d2360d321672c9686256155_JaffaCakes118.exe
-
Size
596KB
-
MD5
333bd0832d2360d321672c9686256155
-
SHA1
3ea00bd195e6efc1d78e173fd00d3543298671b9
-
SHA256
3e250798cfef115cc20f51239795f8c9fc348ad68bf9715eaf9f2a55a7bce823
-
SHA512
685417cecb547e026e58ec303b25d6fad7047e03c6009c306cc4c32cde660c558dbce51e86009e12fc62a45f517776ad53f3fca7d492d7b957dfd901a7540cd6
-
SSDEEP
12288:7PNpEX1APU0NhjZcy9Lz83VxiTSxItCiRkoWKc8QDYUbF:7PNC6Bjj5zO9ik7K/I
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 4816 msedge.exe 4816 msedge.exe 3104 identity_helper.exe 3104 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4816 2000 333bd0832d2360d321672c9686256155_JaffaCakes118.exe 84 PID 2000 wrote to memory of 4816 2000 333bd0832d2360d321672c9686256155_JaffaCakes118.exe 84 PID 4816 wrote to memory of 3964 4816 msedge.exe 85 PID 4816 wrote to memory of 3964 4816 msedge.exe 85 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 4324 4816 msedge.exe 86 PID 4816 wrote to memory of 1576 4816 msedge.exe 87 PID 4816 wrote to memory of 1576 4816 msedge.exe 87 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88 PID 4816 wrote to memory of 3288 4816 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\333bd0832d2360d321672c9686256155_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\333bd0832d2360d321672c9686256155_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=333bd0832d2360d321672c9686256155_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff934b746f8,0x7ff934b74708,0x7ff934b747183⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:23⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:13⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:13⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:83⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:13⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:13⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:13⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:13⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:13⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:13⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,885249082630522972,10773886096202451999,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5744 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=333bd0832d2360d321672c9686256155_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:3696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff934b746f8,0x7ff934b74708,0x7ff934b747183⤵PID:1880
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5b61bcb297fdcb7463a7726558646758e
SHA1b91f5caf2a8f2e896d9128273098ba808425ebb2
SHA256ee44bfcab3691a3c81b34eff65a4bd868412349d8818a2c08a6b10dddf6b9322
SHA5125c8b83c9aeb3879d6cb4cbf5d74730ed55bdd311a76ded36731ee3a306fd7f166cf5733591ea15684cb245a50ce564436b868dc44247b1a0f6b8d214cd99a60d
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD5ad223f14e72694b62517f4bff95b758f
SHA1c507d898d8b3bc259b8e136a5b952cd8aee30e8c
SHA2563023016eb9020fce326b12a7e4a3b2af964739a6ea1d7b689fd67df454fdbcbf
SHA512352c1ca0bdf54fbcda623b6e8ee45f15600d03eaa954398b4c41a21ab709184e9ba6bb408e5cd6dce46b3b2d3465151d9d3c9f71ed7dc0e8bc9dcfb920eb7578
-
Filesize
6KB
MD5cd4a3f1e983a1d7ef0029976e9727837
SHA17f01221556562d3c88543f032a5f7a551c3c07a0
SHA256191cd4ec94b2e17eea47fd2ba26d575ff6683e323cea543c6cdb3689ae3382f1
SHA512b65bfdbe0fc1c31f375ac932738e7f53daf1069a565ee1365ea217828ac58a83540261df730e850cba6aed2bb85e00e9d00a3bfc9cb46a575390b4f992d614ef
-
Filesize
6KB
MD527c931805f648e68260ac13a6aae95b5
SHA10405214d75c3a2785bd715f4dbff4cd21df9d59d
SHA2566a468c6a552f27f5630693738b938316d18bad3b82a9e2a25dc15ce1f45c9b41
SHA5121ad8da8bc783e273ca7e6b41378e94d84e8817cbee0a2ba67e1c500846db88c34f4a23ecb0acdc6c1aa5a489c40c79fc0c1248737d1a4c22a86b259e8d6b58ee
-
Filesize
371B
MD5925d76e4669ed6d2112ccef7fc8c9465
SHA15b3b00106afb068559fb0937a9b2a8574821a336
SHA25637eb44765304e0ac2a5e265260d76dd32d2bdde12c29c91b76d3d4674f8cb5d0
SHA512f5386c51ff09cf3c508276250be7e5d20544bfaf816871986ca0eb94bfae02e15a2f5195f1e3a98dbe231b72bb731c266aeede0810ddc845bea352a4ac0c6e7c
-
Filesize
369B
MD51aa2f821caccfed243772e57f92ffd7e
SHA19b3372ed6478d05ef91ed684f3824ebbddf3adde
SHA25631fd97f8ca71dd96d59fe26414faa8a58c626c7411ab09ef9553b8a64d52510c
SHA512fed25df43c07f5e0922fe0fd3c8be848eca06a7b983b99505b337461b3adc15edd2059edbdaf713d1238fde26ae5437267c868bea44e8eb1e112f97ccbc1be50
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e8272b90a6ad26395e9d87ad3eb3ec92
SHA15b381d974cd8ba014b761cf5ed719cb975e69196
SHA2568dd05792740941f26f9f187cae9d6cf67c2b9a5d31781a1a91079d74351daf58
SHA5126c631b9c63613cdbf9820f6ba5eb5305bfcba43fb01f3036111fac4be3d7f11fb8dc18691d84eb105fe6895d7817c0d9efc36331b6048c48a45d3d15640a3cf3