Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
167422e6aa41b199d101f79881304167_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
167422e6aa41b199d101f79881304167_JaffaCakes118.exe
-
Size
530KB
-
MD5
167422e6aa41b199d101f79881304167
-
SHA1
be84b7db3b001da07713bed7dcf3a8d787f8be04
-
SHA256
5198899e552f825a815bc17b07aecc7575be778a13205f35734e7aa59d6ba287
-
SHA512
b9f5b14a96b655b4e8e15b3d2beae257d85791b31782d89033a059e09a97c9c8b24a6a9665fda9349a6e4abc39161fd4d30a93af298dafb26e1debde5b21cd9e
-
SSDEEP
12288:GjQJGJ17jTm/pq1Zi2HnGPLIwgjjyp21ZZ6Sy:eQJGJIB0ILIwwj6K6X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 3672 msedge.exe 3672 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3672 4932 167422e6aa41b199d101f79881304167_JaffaCakes118.exe 87 PID 4932 wrote to memory of 3672 4932 167422e6aa41b199d101f79881304167_JaffaCakes118.exe 87 PID 3672 wrote to memory of 2036 3672 msedge.exe 88 PID 3672 wrote to memory of 2036 3672 msedge.exe 88 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 232 3672 msedge.exe 89 PID 3672 wrote to memory of 4548 3672 msedge.exe 90 PID 3672 wrote to memory of 4548 3672 msedge.exe 90 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91 PID 3672 wrote to memory of 736 3672 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\167422e6aa41b199d101f79881304167_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\167422e6aa41b199d101f79881304167_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=167422e6aa41b199d101f79881304167_JaffaCakes118.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee2e846f8,0x7ffee2e84708,0x7ffee2e847183⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:23⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:83⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:13⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:13⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:13⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:83⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:13⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:13⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:13⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:13⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:13⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:13⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,2030526169557458174,10600668221317264870,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=167422e6aa41b199d101f79881304167_JaffaCakes118.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.02⤵PID:1564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee2e846f8,0x7ffee2e84708,0x7ffee2e847183⤵PID:2864
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD59e95b95e15a249bdd58e92e1aeee9b16
SHA1b2c1dece60bbf023fc617dffc7c178f7267447bb
SHA256613f010e142338f8bd72af18871b1701975e7bcacb3c55f5c5a1c0b4b7982f12
SHA512bc3c65cd61038c5fccdc305fbf57bc7c174618390deb561f869277e823eb1d72e95ff804e9e7496663ec0ead59d47fba6e47e35133929b1d42e1061944f29d8c
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD5aae866272ed452a740eaf77daf357029
SHA14ccf7dad9a4f9e0a53714501b80df08afd2f60ad
SHA256b4431e55df77fe038ad52c4e593d2972cba0ab8a0ad047b37d6035a72ecf28c1
SHA5122d5718f16d12cc2a066d7f7aa79c71347cbfa899880ce12de5edcc5d0e88ed1cd3b052eee12a2d0c16c2ee3c9137af88e55bf4cce4a52da1140651a92499ce8a
-
Filesize
5KB
MD5a0ad4199a078b7f01c5e3bb53266be82
SHA18776cffcba6bab77bc9373f289200058c7f8f38d
SHA25662247c1d2930e31434ff1b8e02388c82d0de1b645db9e486c7f446fafe23e3fb
SHA512152f548848ed43f128475e7ee00ffefd9f6994e0c09c8334531183f068efbd0f8375877dd7adb593578da3007c9cd349abafd72d4867c24602edc5fbcece01ce
-
Filesize
6KB
MD53d27a0d32e07712849c86e0d2fe5417a
SHA132e0130b16c86a96f5a7f081acc75aa7ebbe455b
SHA256f5f0fb96d8c03cfc987037f9ad68cc502c96aa757ea03e7e8d3458a54e32c649
SHA51244d6562b19da3abf961d49d14966a1973fe491e0c181ceeacbf3ad8e7b323c7beb5dbb3ee9f29d9419234e081225b72a9f354dfa89d4b1a55f380115f9d07196
-
Filesize
371B
MD5a3f78404f1f059cfdfa33acf5103a962
SHA14c9bf7b18597dc4a7e1203a669a59b80f04ca299
SHA256c93592166521658271799956089c73d5ce1fdfe6efcd05265b5d59de71575494
SHA51290d585223a4193b42546c0945812c169a8f9d954715acf697d31a9435873654c90707cef34506b77515b858f16b11dfafd583b31dbaeda84a29f29d040e06062
-
Filesize
367B
MD54fdeaaa15ae5eba97e4280f194256edd
SHA1cdd47b32ff00259c6ff914c95e7e8b33f4baa2ec
SHA256216ba41ce10f7cb7d9a8e7ac0f8bd551d28ba57e4644a9d23c91b22f6fa2e389
SHA512b098579fb18c9a966308ba73db0a4480c130dc32d090bd5adf3626ad5f410eac4b35de1f893b6f23bb414e033b63032b69427d719f8a1290fcccba160d13f684
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f46db1d2cc1b28edf6eb84cbcc8cdd98
SHA1d9bfa7dea029d29201ec90013d02aadfb52336ce
SHA25622f64b035d557e3e718dcd9769faa9870949699ea4ab0a3e8f4e65bb618fc34f
SHA512d87f3765fa96b5502a6c05a7b4bc77c4f9c9cc21d4136722cae8bba44a133eba85880411d04fd7807c6e7809b75da720ae3bc4ce84e5ecf459570714ba7c8bb3