Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe
-
Size
137KB
-
MD5
d6661286a00570bd7df30dfe987c4798
-
SHA1
777a800c8ac38f36751131a9f4f231c3d8f02cf4
-
SHA256
9b346ea6ea3b2f637b52d844914165b25ec57cc5e34b295b6874717c4e8dc715
-
SHA512
400169820a5fbc63d9a6f67b05ee51d413f44855a77e225325b2423d56f39d0ceaacb06938f40633b952075bee5c575f26b03275e936332a38d9453e5d72bdfc
-
SSDEEP
1536:rAjd07zc2Cxoq0ZLrIMme41MTv6i8Zn7s2fJudgE:WeIxoIcb87udgE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3600 msedge.exe 3600 msedge.exe 4660 msedge.exe 4660 msedge.exe 976 identity_helper.exe 976 identity_helper.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 4660 1912 d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe 88 PID 1912 wrote to memory of 4660 1912 d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe 88 PID 4660 wrote to memory of 1464 4660 msedge.exe 89 PID 4660 wrote to memory of 1464 4660 msedge.exe 89 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 728 4660 msedge.exe 91 PID 4660 wrote to memory of 3600 4660 msedge.exe 92 PID 4660 wrote to memory of 3600 4660 msedge.exe 92 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93 PID 4660 wrote to memory of 3960 4660 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6661286a00570bd7df30dfe987c4798_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://arifcheaterbtm.blogspot.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb255246f8,0x7ffb25524708,0x7ffb255247183⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:83⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:13⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:13⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:13⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:13⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:83⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6480 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:13⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:13⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:13⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:13⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,10872010924503092363,2334749902435556512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5077421bd68b96eab56eea0f3d659b161
SHA17bc2c4038c2151b53289a530e81589be6a81783d
SHA2562f7f0e2789a4f812a9a31dfadda32edd84a47111b0b6645ad11d5668aeaead0c
SHA512b2402c2ab436e556f693638c2ba882da13d39617388a64c3b7fcd4102f0dd815f00dbe9f3386555eae350a3fca11d02236983de8d7c34bff5280d9f6089f0f39
-
Filesize
4KB
MD511015ce40a9d890397179cc1356b18b2
SHA13cd5e2513877c1084d4d877c2d30c653ed804380
SHA2564a55d8a57a9dbcfc3774af74e4d4a2bf3a2cabaf5a5f0fbf602799700b78ae45
SHA5122229b564dddee60b74fe9975554d9a538ad0f340c723ecfea7f641c9964f85431a8396a0c76d90834d39fdcbb8dd001a1d82de348cb576a1c6a45a3f082ec78f
-
Filesize
6KB
MD56979846ec13869a2dcada05c46b782aa
SHA122c0c349bffacd48e9fb59dd89093ec914957454
SHA2564a9af8b0844605cd9bf27cf2b00685d00800e6fef269b1ee003afc820401c4b6
SHA512ab2131d7575a8f5e85f4f8160763b68a947afe7c28c9f098d1da5a815b28722993bfba95391316dfa81e011571d3ea421e930832c3cb0105b073c53418f2b1f7
-
Filesize
8KB
MD5816ddc4bcd9394de9234f9bc18cf0a6c
SHA16227eb386f68692baac20ae05329c0934905ebd4
SHA256bb2179126c29d6749deb7d5245b576a185ad65ec53f930e55807a52a476934d9
SHA5124826b6155ba2c89061fc48f5ad1a44f5aa44a6a6e04e00eea4d8ab6f9f34129434fd06a150ce6dce8a4d6f389304b1c259b168fe0ed3eac4d456fb0f1e936816
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD525fdc32e8390a941d060e7c963fc7bb0
SHA1ebccc1bcc9adba973f1b8455d845560921696934
SHA2565aab2c960378ac69ff9fd6463a7f0479e5a62bcbdbe99fa943ecf837dff656c2
SHA512e7d447bf956e0c10764a70bbf7ada016e16eaf77afec9d668f89b14c77b021305475305414951fc55b7289503fa94be163d5e872bf466c4cf65849dc1c6f124c