Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe
-
Size
20KB
-
MD5
1b87042edee59291e0720480c979b5ce
-
SHA1
44bf878fb610f2d972073662178cb617a92bbee3
-
SHA256
38fa318058d9f22349806e58c99830f91933349c2322efe5205adf06d2ec29af
-
SHA512
1188788f7bcac2150144a75f5fbadf2ee13feb9b56314671522f8aad9edcf9aad5391340f97731aab48e38b68f0d6ddd113a083e6eb67fa191181a4ae2b63449
-
SSDEEP
384:UiWnkW7Ti4oOpdiXYrZOQn3OrjlOonRjDHwJgLaFVp2y1N2eaEZj4Kwr:05GnagY7n3ONfwKLpy/3ZNW
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmqczj.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UFO.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmsk.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kabaload.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nod32kui.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\guangd.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchX.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\appdllman.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAttachment.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREng.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\logogo.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmo.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVSetup.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.EXE\Debugger = "C:\\Windows\\system32\\snowfall.exe" 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\i: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\j: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\p: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\o: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\w: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\x: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\v: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\y: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\h: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\m: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\q: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\s: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\t: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\u: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\z: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\e: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\k: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\l: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\n: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened (read-only) \??\r: 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\c:\autorun.inf 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened for modification \??\c:\autorun.inf 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File created \??\f:\autorun.inf 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened for modification \??\f:\autorun.inf 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\TestDll.dll 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\TestDll.dll 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File created C:\Windows\SysWOW64\snowfall.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe File created C:\Windows\SysWOW64\1.inf 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Services\svchost.exe 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2904 1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b87042edee59291e0720480c979b5ce_JaffaCakes118.exe"1⤵
- Event Triggered Execution: Image File Execution Options Injection
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5e51d34186120eb58824a348240ac00f8
SHA1cdece2c2392cea00dd90a9046c6c85b26d5a8533
SHA256714ef2a9893367a64bc9369a91d254a902400757ffeecbdf7e6003d2b3283d2a
SHA512ba1f92705e67d68234569cfe6831985603d097fb3cd81d0eba0e27cdf4215a3b12d8edb0eba2b1909101067ef3541351b3b689d8c60b7eab5071102efa3b0360
-
Filesize
20KB
MD51b87042edee59291e0720480c979b5ce
SHA144bf878fb610f2d972073662178cb617a92bbee3
SHA25638fa318058d9f22349806e58c99830f91933349c2322efe5205adf06d2ec29af
SHA5121188788f7bcac2150144a75f5fbadf2ee13feb9b56314671522f8aad9edcf9aad5391340f97731aab48e38b68f0d6ddd113a083e6eb67fa191181a4ae2b63449