Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe
-
Size
82KB
-
MD5
2b1ade654d592bd995ef90c7a341a16b
-
SHA1
6a5403c77f5a8e4cd005dd455b5bbcf260af9554
-
SHA256
9c3c1d396098f13a4872fb0b60119f7effd614c589c7da3eafce4c36d36500eb
-
SHA512
dae9e49a916e11809072932fecc6258d4f7e76e5a3b0eabfe532d3b270de693af1eb32077588b685b3e13346a05fe669660f547846f1463146e14071cce78738
-
SSDEEP
1536:5QQ2aTmnPfYc9Yh8Op3MrfENGaIkaN7ZG6d9jdvw:5QQ2aSPBGCOp3mEjIk47jd9jdI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4464 msedge.exe 4464 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3276 4420 2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe 86 PID 4420 wrote to memory of 3276 4420 2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe 86 PID 4420 wrote to memory of 3276 4420 2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe 86 PID 3276 wrote to memory of 224 3276 cmd.exe 88 PID 3276 wrote to memory of 224 3276 cmd.exe 88 PID 3276 wrote to memory of 224 3276 cmd.exe 88 PID 3276 wrote to memory of 4464 3276 cmd.exe 89 PID 3276 wrote to memory of 4464 3276 cmd.exe 89 PID 4464 wrote to memory of 4624 4464 msedge.exe 92 PID 4464 wrote to memory of 4624 4464 msedge.exe 92 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 3896 4464 msedge.exe 93 PID 4464 wrote to memory of 4752 4464 msedge.exe 94 PID 4464 wrote to memory of 4752 4464 msedge.exe 94 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95 PID 4464 wrote to memory of 1616 4464 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~AE70.CMD" "C:\Users\Admin\AppData\Local\Temp\2b1ade654d592bd995ef90c7a341a16b_JaffaCakes118.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\net.exenet use \\bwfp\caddata$ 99Parvati /user:bw-ad\bwcad-remote3⤵
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bwcad01/enhancement20073⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdc15646f8,0x7ffdc1564708,0x7ffdc15647184⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:24⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:84⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2136 /prefetch:14⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:14⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4372 /prefetch:14⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:14⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:84⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:14⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:14⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:14⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:14⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2796 /prefetch:14⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:14⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10301749610548077960,6726413653260427127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5280 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD501386cdb9833b9cac60000cb06c2bd4f
SHA1f82966c547de35eb672b0fbf96d9ad69ebeab4ee
SHA256dece57366a8681a8ac9f112b2d63137415d006b860855e7c6b39d0cdc0b880d4
SHA51261a97d5affdb4508388efe44d1628cf55292ac10c2b7355b86364fa34b92b1a8fd698f6de44c0e71a341ff55a5660116fc4c32409d284891ad917e7d506a40e8
-
Filesize
6KB
MD5763a33cadaf3f06b4cadac38276b43b7
SHA1ad428333f449fdeab3b67d9cff637fe31c106322
SHA256757705852628190dc056214bd7895f97e2374efdbb3f2ec841b6e13a0dc35c9a
SHA5120108a086935af28e45bc769b12157cf7bb5c61af58fa12dcdeeb5cb3bad2219afd5c6712b86436355d27eb754e003f139a4c36f23895d2ba7237a81cee518add
-
Filesize
6KB
MD5cd132b028d1ad3b9952c5b12227d6caa
SHA19651e6bb1bca85a2f6c1563b058a4c2700db4605
SHA256b242cd4673f13761497ae1ed639aa8ae1118ee44b08ab3c6639958f79e2b76a4
SHA5120f5b0907f12e21dedbd9d29a5aa804040627ac53daa0ff2722a5fd669d131db6c8fce132d38dd5a8f07ccdd9e2ff7dfb143872f01819cc7637da7e300289b895
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d994922b63f23413ae647e5243fffb44
SHA14d2c89d1e1c82419c61936461e87f4e819316dc7
SHA256008aa3874fe0e89780c0af634d5f11db057a0b2ae9c6bc8658ce4b0217b9f71e
SHA5124c9df14088bd2b91c9540af22af6424fd89234072918053d554924f80397da310d8c72eed6c620405a85dfbd2106b9337796df609d34ef70e1b6bfc84251c13e
-
Filesize
1004B
MD57fb6b94c3d4ba8d720a3126c07cc0de6
SHA13c3158bfd8e4f8ab08d2ef0eb077d700d113e0a4
SHA2561ae823d0f1531030e88e14ae4129d50f4a2f9b8a13111679b6d4469651105d2f
SHA512303c61077c93f5f0a75c382ebce4a9e16252b8a203aa10f27886d1cb5f6101745864adb9dbf5070abb78b3dfb7df61a988257b952c0b50f3e27321014d2e1cfb