Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe
-
Size
78KB
-
MD5
375903f0b52c30e59fe62b40b9f403a5
-
SHA1
bfa63e82bdd4a1202aa51c35a35b5fd7dfe07d41
-
SHA256
940887afddfa3f57f4039670cb2a80de14b5b7496ea8db1dc223eea540a1ee4a
-
SHA512
6888b59c3901262d376737340a5a2ebcafdb5c7e7de42378922aa12754d0c447fbc8732ecd41e741cd2e15f07e184cc7560c4df5cfe0a2297c9e97ace54a8ee1
-
SSDEEP
1536:bPWV5jSZLT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQtd6U9/q1zj:bPWV5jSxE2EwR4uY41HyvYf9/c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 568 msedge.exe 568 msedge.exe 1588 msedge.exe 1588 msedge.exe 1508 identity_helper.exe 1508 identity_helper.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe 1588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1588 2664 375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe 85 PID 2664 wrote to memory of 1588 2664 375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe 85 PID 1588 wrote to memory of 2120 1588 msedge.exe 86 PID 1588 wrote to memory of 2120 1588 msedge.exe 86 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 4080 1588 msedge.exe 87 PID 1588 wrote to memory of 568 1588 msedge.exe 88 PID 1588 wrote to memory of 568 1588 msedge.exe 88 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89 PID 1588 wrote to memory of 3012 1588 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8dbc446f8,0x7ff8dbc44708,0x7ff8dbc447183⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:23⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:83⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:13⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:13⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:83⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:13⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:13⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:13⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:13⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:13⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:13⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,15853323435441780538,16279144468433246771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=375903f0b52c30e59fe62b40b9f403a5_JaffaCakes118.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵PID:752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8dbc446f8,0x7ff8dbc44708,0x7ff8dbc447183⤵PID:5020
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5e461a246835914071b219faf2d1de0af
SHA1ce75212c48b7e15a98b06cd9f03a8a9fe2327832
SHA2560491af34f538153d0a1d3eeccfa71ad217be47d22a7dc051e6142bec8cb85977
SHA5122bbe74709666416f3cf567c8cc1b5439312a8b17a2cda526a16918ef87eb239eb1d95a6526be96d111730f23d36ba45318dc55fcd950a024b0b956ce08ab0c5d
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD556aaf5cf47ba8aec99a87fbb3ff3c9d7
SHA1aed29e101012e77d0619fbfcdb418d7b2115e904
SHA25649d0428a307e6ec8f59e00c03dbd4ebf751234b91d148d5b0f22fd85b22314e6
SHA512678560fa0001a4cef43c31f95443b619b243b5ca68fbea8aa3632286296627628b4114eaa2e17d7f86c47fe5ad2e6a48b93d85b7ed91eb56d8b0d66e22ff8011
-
Filesize
6KB
MD5f3ffe3365d742cb61a72c3c6c8bebd26
SHA1ff89a7c9b65a1796f5b14f2344f4eb55eaf2417f
SHA2564d52c3a5fb1acc159a8450a4ed6686e6c34320c8309a3d89098121310bebed93
SHA51276eba691aeb10ee750f9eb1dc6c5cd4f4f709706286cc8663cadbce4c99804b5fa493e736f74e5aac45458fc393320a88bcdee4fc2c44a8fbe2c368e5b9eba99
-
Filesize
6KB
MD595b152a80c87c4fa3d52267b049b9a66
SHA13fb1036a035ffeb66570290b46fb0c1a6cfa84dc
SHA256a623dfe7ce56bbe750be4a63e950f5f75d16dc4a0223186704d3c4446dbd4cf8
SHA512b64ba4998ca2971a353e6551ba25b7784fa6bd4f8f51d877b0e9050aff378fecfde52ee66a06f739e7511c559f91196e3f17cd589e7210587c12defa0f31d855
-
Filesize
371B
MD5a2efbca4755eb55783520afabb0619a2
SHA1b4f549de4fe72b0ef22b42a6185f617d3d3440e8
SHA256018bff1c9a45dd283d195ba4df9b5663f31e7f736cbc39dfbb71fca87740395c
SHA51241a99bde7ffb74a1f3e9c020077bc012a6c7a5d4b416f7880535b9d92f3d2ab78c46d1b339621186a6245d7b08318e1f70d2aabedc2f566a0a1cda51277ab08a
-
Filesize
371B
MD52cb7f32b26eefe8ac24586266fa82201
SHA1af10dd14487b565ca283ceb8b4c0282160ded0fd
SHA25690c6cd223cba17ed7c07f5eb2ba01066b13693f0bbc39ffe5d4a8a2534d98ec6
SHA512b53d8aee9751a2f76ac43dccb669bd4251c54bee14b695474a626873fc50d1c7f8b5a93b13d137182e4dc9d5df655936a7cc3e9919b62f2741327d3a8ab1b0bc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f58c4190d524aedb05eab7e4b8bd34ea
SHA1cd7049cf45a846a44f5306af5cfb478acb0dc844
SHA256f56e3280e88661a7c8f30939f32e64b9d44f34bd8cdb0f2b16811c4f03711e7b
SHA512cdf30dd5f52b5f2e794026f6ad3a62f03167c378a31c5584e99339bb63ce13c67e7dcfd052046f1ffe9398f9e0097022a0e57c2310496bdfe1d65bf0f0219309