Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe
-
Size
43KB
-
MD5
69e9cba3ce32b07a56a645a7375216bd
-
SHA1
5b332b7542b8458d8500d865cf26b29ca9051e65
-
SHA256
37b04fe679d32f9dd8abcb4f094c1507c717e010756446a24e0c1af4c112b5b3
-
SHA512
de76dd02f4335a1f39b7de52a89c853d492680518c0f12571eb34a8532d2aa05e7712977b8fa48b1832bdecae204ebed1883e59ce83ab5120f75823defff4e40
-
SSDEEP
768:pAoGujb0SmT6T6liMkFoqe91zagDtCzKSj+Y1WbNyQlRAZnkLv:pLGjT6T6li0qe1zagDEZj+Y1kkn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4356 3712 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 4464 msedge.exe 4464 msedge.exe 4244 msedge.exe 4244 msedge.exe 1416 identity_helper.exe 1416 identity_helper.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4244 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 90 PID 3712 wrote to memory of 4244 3712 69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe 90 PID 4244 wrote to memory of 3720 4244 msedge.exe 91 PID 4244 wrote to memory of 3720 4244 msedge.exe 91 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 3536 4244 msedge.exe 93 PID 4244 wrote to memory of 4464 4244 msedge.exe 94 PID 4244 wrote to memory of 4464 4244 msedge.exe 94 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95 PID 4244 wrote to memory of 2372 4244 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69e9cba3ce32b07a56a645a7375216bd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 2202⤵
- Program crash
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.receita.fazenda.gov.br/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdf4146f8,0x7ffcdf414708,0x7ffcdf4147183⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:83⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:13⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:13⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:83⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:13⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:13⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:13⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:13⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17363140702626575512,116713766021891266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4772 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3712 -ip 37121⤵PID:3488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD578215ebd17da024261c1dfa2e48346ed
SHA1c01f7af20986c65b8e347f8dfe6240994f347871
SHA256edbe0994b5db390694fdf62dd200c31dc4b5fad24a46e8751abae1e73f2b7c93
SHA5126384d825fa9102e91e1d96da3b8e2e2ab60be71913851901e9c9ad441b716c0069ebb2fc4b27da6540bbe8b3c464d9b2750b428c60f8be3952ff96a61316bfdd
-
Filesize
699B
MD50ce76ea9c108f769a9a614eb88e87e45
SHA1589fac9f8f4506ad36eed56db1c5a6d9a041ef36
SHA256f883e739b2076ec045defe82678c1bca99da9f4540d94815e9c4a8d79ff3bc21
SHA51293878016e13e856d09a546bca819fe05ebd071d217f0510362b019252ac3290b6e0f6f2a1bfd7db696e95858358020bdb2c29249c21800a970ba18001ba9695c
-
Filesize
6KB
MD5a66b47c7329fea0d78e213dd61ec0d66
SHA1b6c6da7b2da73460c5fd2254b174d26f3a794640
SHA2563fbdb80edc7aeccff32fb17667407a032e57b68b067cfc555f00dc9595db89d7
SHA5120be68dbe0e4503cf78d53535b8dfaad836ebd8f389b82e758e104ca06c77a51a73ef1165ae388018c4c4345877fc858b8d81849641b031d6d66894e6971515a3
-
Filesize
6KB
MD56a6fbbd28be1dfa7e722bd98d5526d77
SHA126ed3aa4580eab341a72a3325bd9647c2df4ba9f
SHA256305ce9da2121ffb614ba0ce0cfd5d861f491313a447382d794fe56890dca8a70
SHA512a5ad49288b18802812a8f3ac3963613952ef29b31cb3d5909c8b25d3f3ea527fd3186ab5758ad82e6f99442bb62c9b1e84708fd99e0ffe939f0cf31863431808
-
Filesize
5KB
MD5dd834a9858f91e7d5009ee7308f4998d
SHA13bcb55c42a59bcb05226cadd4c6c004898671517
SHA256e066cf83d3aca810a1dc0bd9e1deaecd7d0b149cd07c396149e79b7c84a0e922
SHA5126b041da10e778b6ac998547924ff1c422d1b6b8cb65d95b4ffbc1354d5d163a55b4c819feb9a49e940600ca513f323823e8d5ec653b7f7acd58d3f7938fd7a10
-
Filesize
874B
MD5d9495adffdca0e7384fd17aa801dbdb9
SHA1d6295f39ff1cd01b76fd5aabf4fec76124db8146
SHA256aa2ecd37390c822237435ff7856ff5c2861dd5306b282b3c24d35aafd4b3ada0
SHA5128a1eae9f6f5767f7ff4b56c6da9fe27c71a621880b5993a85ab813055f6f00bb322f13269e2b27fb8093eb90b6af9ec0117eb3d1c8fe4819b450077c78871e9b
-
Filesize
874B
MD52de63df1c7918615d126ed28d7ca8438
SHA1bbf305140e888350f6c4bf6998c7d8b3dcb511cf
SHA25670915006f6a241b4cfd4179837a8a38ef1a0c363ae987121b406168d196c13c8
SHA512d1d1e087620faa45784d02fe96c0447812380a3152e092c46e25200e8b14071beca94c5fa77640a328ae163693c7c724efe172d7ac4e70a976565e0205a01dee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5678a03e39475c23f0ea7d44cf972d807
SHA1dd3d6dd65afc240f072125e6b7aaf16894f78da6
SHA256bc0f45346a7a85078983be63b9883a42412634e0597f06096741c7d811dae627
SHA512d3c0c8949da1af647dc6568c1b77eb9d40c6593b8cfddf23f92b8b659c7101ee88fdc3b751569a454b8b80b535eb3ae283254930d89a8802c09f447c97388b74