Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe
-
Size
228KB
-
MD5
4dd70453aa7a3d53d0b0188fb4c798fb
-
SHA1
e92ba1890868b76f0afcdd35c43ece3475f728ad
-
SHA256
d7c6608fb7db4ccfb0aaa49322534e412147c41a14ce1e3c32285982952cc9aa
-
SHA512
47023aad87a0ae65a7bded7d95a78ec92e658a87363515c99efb5293de5993689fc261f14c8147e3564529720443619aedba3ffcb4c4e67827d7ebf86cdb9ed4
-
SSDEEP
6144:qoEdkmu85Dq+3qM3W7tfQN5/inEaMadDKNa1aILk71:gkmDN6M3atfQunka1KNaTgJ
Malware Config
Signatures
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 3024 cPaner.com 2032 cPaner.com 1656 cPaner.com 4284 cPaner.com 3504 cPaner.com 2172 cPaner.com 416 cPaner.com 3476 cPaner.com 3508 cPaner.com 3528 cPaner.com -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com -
Runs .reg file with regedit 11 IoCs
pid Process 592 regedit.exe 4848 regedit.exe 3312 regedit.exe 3624 regedit.exe 4832 regedit.exe 1764 regedit.exe 4016 regedit.exe 2124 regedit.exe 1616 regedit.exe 1224 regedit.exe 1376 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 920 2376 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 83 PID 2376 wrote to memory of 920 2376 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 83 PID 2376 wrote to memory of 920 2376 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 83 PID 920 wrote to memory of 592 920 cmd.exe 84 PID 920 wrote to memory of 592 920 cmd.exe 84 PID 920 wrote to memory of 592 920 cmd.exe 84 PID 2376 wrote to memory of 3024 2376 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 86 PID 2376 wrote to memory of 3024 2376 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 86 PID 2376 wrote to memory of 3024 2376 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 86 PID 3024 wrote to memory of 1960 3024 cPaner.com 88 PID 3024 wrote to memory of 1960 3024 cPaner.com 88 PID 3024 wrote to memory of 1960 3024 cPaner.com 88 PID 1960 wrote to memory of 1616 1960 cmd.exe 89 PID 1960 wrote to memory of 1616 1960 cmd.exe 89 PID 1960 wrote to memory of 1616 1960 cmd.exe 89 PID 3024 wrote to memory of 2032 3024 cPaner.com 91 PID 3024 wrote to memory of 2032 3024 cPaner.com 91 PID 3024 wrote to memory of 2032 3024 cPaner.com 91 PID 2032 wrote to memory of 4208 2032 cPaner.com 92 PID 2032 wrote to memory of 4208 2032 cPaner.com 92 PID 2032 wrote to memory of 4208 2032 cPaner.com 92 PID 4208 wrote to memory of 1224 4208 cmd.exe 93 PID 4208 wrote to memory of 1224 4208 cmd.exe 93 PID 4208 wrote to memory of 1224 4208 cmd.exe 93 PID 2032 wrote to memory of 1656 2032 cPaner.com 96 PID 2032 wrote to memory of 1656 2032 cPaner.com 96 PID 2032 wrote to memory of 1656 2032 cPaner.com 96 PID 1656 wrote to memory of 184 1656 cPaner.com 97 PID 1656 wrote to memory of 184 1656 cPaner.com 97 PID 1656 wrote to memory of 184 1656 cPaner.com 97 PID 184 wrote to memory of 1376 184 cmd.exe 98 PID 184 wrote to memory of 1376 184 cmd.exe 98 PID 184 wrote to memory of 1376 184 cmd.exe 98 PID 1656 wrote to memory of 4284 1656 cPaner.com 100 PID 1656 wrote to memory of 4284 1656 cPaner.com 100 PID 1656 wrote to memory of 4284 1656 cPaner.com 100 PID 4284 wrote to memory of 3384 4284 cPaner.com 101 PID 4284 wrote to memory of 3384 4284 cPaner.com 101 PID 4284 wrote to memory of 3384 4284 cPaner.com 101 PID 3384 wrote to memory of 3624 3384 cmd.exe 102 PID 3384 wrote to memory of 3624 3384 cmd.exe 102 PID 3384 wrote to memory of 3624 3384 cmd.exe 102 PID 4284 wrote to memory of 3504 4284 cPaner.com 103 PID 4284 wrote to memory of 3504 4284 cPaner.com 103 PID 4284 wrote to memory of 3504 4284 cPaner.com 103 PID 3504 wrote to memory of 1356 3504 cPaner.com 104 PID 3504 wrote to memory of 1356 3504 cPaner.com 104 PID 3504 wrote to memory of 1356 3504 cPaner.com 104 PID 1356 wrote to memory of 4832 1356 cmd.exe 105 PID 1356 wrote to memory of 4832 1356 cmd.exe 105 PID 1356 wrote to memory of 4832 1356 cmd.exe 105 PID 3504 wrote to memory of 2172 3504 cPaner.com 106 PID 3504 wrote to memory of 2172 3504 cPaner.com 106 PID 3504 wrote to memory of 2172 3504 cPaner.com 106 PID 2172 wrote to memory of 1528 2172 cPaner.com 107 PID 2172 wrote to memory of 1528 2172 cPaner.com 107 PID 2172 wrote to memory of 1528 2172 cPaner.com 107 PID 1528 wrote to memory of 1764 1528 cmd.exe 108 PID 1528 wrote to memory of 1764 1528 cmd.exe 108 PID 1528 wrote to memory of 1764 1528 cmd.exe 108 PID 2172 wrote to memory of 416 2172 cPaner.com 109 PID 2172 wrote to memory of 416 2172 cPaner.com 109 PID 2172 wrote to memory of 416 2172 cPaner.com 109 PID 416 wrote to memory of 5096 416 cPaner.com 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- Runs .reg file with regedit
PID:592
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1100 "C:\Users\Admin\AppData\Local\Temp\4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- Runs .reg file with regedit
PID:1616
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1212 "C:\Windows\SysWOW64\cPaner.com"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat4⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- Runs .reg file with regedit
PID:1224
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1180 "C:\Windows\SysWOW64\cPaner.com"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat5⤵
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- Runs .reg file with regedit
PID:1376
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1188 "C:\Windows\SysWOW64\cPaner.com"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat6⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- Runs .reg file with regedit
PID:3624
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1192 "C:\Windows\SysWOW64\cPaner.com"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat7⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- Runs .reg file with regedit
PID:4832
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1196 "C:\Windows\SysWOW64\cPaner.com"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat8⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- Runs .reg file with regedit
PID:1764
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1200 "C:\Windows\SysWOW64\cPaner.com"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat9⤵PID:5096
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- Runs .reg file with regedit
PID:4848
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1204 "C:\Windows\SysWOW64\cPaner.com"9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat10⤵PID:1840
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- Runs .reg file with regedit
PID:4016
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1208 "C:\Windows\SysWOW64\cPaner.com"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat11⤵PID:228
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- Runs .reg file with regedit
PID:2124
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1184 "C:\Windows\SysWOW64\cPaner.com"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat12⤵PID:1520
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- Runs .reg file with regedit
PID:3312
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD563ff40a70037650fd0acfd68314ffc94
SHA11ab29adec6714edf286485ac5889fddb1d092e93
SHA2561e607f10a90fdbaffe26e81c9a5f320fb9c954391d2adcc55fdfdfca1601714b
SHA5122b41ce69cd1541897fbae5497f06779ac8182ff84fbf29ac29b7c2b234753fe44e7dfc6e4c257af222d466536fa4e50e247dcb68a9e1ad7766245dedfcfb6fdc
-
Filesize
2KB
MD5bef09dc596b7b91eec4f38765e0965b7
SHA1b8bb8d2eb918e0979b08fd1967dac127874b9de5
SHA2568dab724d5941eb7becff35ce1a76e8525dcdca024900e70758300dcdddf8e265
SHA5120bbce4150b47bafb674f2074fdfc20df86edadb85037f93c541d1d53f721ed52e37a49d14522dac56e9d2e9ce801bcdb701509fa02285778a086d547f1be966a
-
Filesize
3KB
MD5d085cde42c14e8ee2a5e8870d08aee42
SHA1c8e967f1d301f97dbcf252d7e1677e590126f994
SHA256a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f
SHA512de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b
-
Filesize
476B
MD5a5d4cddfecf34e5391a7a3df62312327
SHA104a3c708bab0c15b6746cf9dbf41a71c917a98b9
SHA2568961a4310b2413753851ba8afe2feb4c522c20e856c6a98537d8ab440f48853a
SHA51248024549d0fcb88e3bd46f7fb42715181142cae764a3daeb64cad07f10cf3bf14153731aeafba9a191557e29ddf1c5b62a460588823df215e2246eddaeff6643
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
1KB
MD58a84d46ef81c793a90a80bc806cffdcf
SHA102fac9db9330040ffc613a325686ddca2678a7c5
SHA256201891985252489d470c08e66c42a4cf5f9220be3051b9a167936c8f80a606c4
SHA512b198b32fd9be872968644641248d4e3794aa095f446bab4e1c5a54b2c109df166bbdfb54d4fd8912d202f92ac69b1685ed0c30256e40f30d72e433ee987cc374
-
Filesize
1KB
MD5a920eceddece6cf7f3487fd8e919af34
SHA1a6dee2d31d4cbd1b18f5d3bc971521411a699889
SHA256ec2d3952154412db3202f5c95e4d1b02c40a7f71f4458898ddc36e827a7b32d6
SHA512a4700af2ce477c7ce33f434cdddd4031e88c3926d05475f522a753063269fe8b6e50b649c3e939272240194951cb70ac05df533978c19839e381141535275ecc
-
Filesize
3KB
MD55aa228bc61037ddaf7a22dab4a04e9a1
SHA1b50fcd8f643ea748f989a06e38c778884b3c19f2
SHA25665c7c12f00303ec69556e7e108d2fb3881b761b5e68d12e8ae94d80ab1fd7d8b
SHA5122ac1a9465083463a116b33039b4c4014433bda78a61e6312dde0e8f74f0a6a6881017041985871badee442a693d66385fe87cbfc60f1309f7a3c9fb59ec6f2aa
-
Filesize
2KB
MD5f8a9a1aa9bab7821d25ae628e6d04f68
SHA1c3e7a9ccc9805ae94aabfd16e2cb461fde3fae5a
SHA25676ee7c489d11427af94d0334368ef2ed44df4a74984ffd4022c9ea9fae9c41fb
SHA5120fb3a29367fa3c3eb36c6a7e9ff217ccdd7cce18309964aa7068a00f500ea4ea49588344ebbc52ae77d83e5042c3fdb84f56fa1dae07b8bb774aed6fffd18c0a
-
Filesize
701B
MD5e427a32326a6a806e7b7b4fdbbe0ed4c
SHA1b10626953332aeb7c524f2a29f47ca8b0bee38b1
SHA256b5cfd1100679c495202229aede417b8a385405cb9d467d2d89b936fc99245839
SHA5126bd679341bec6b224962f3d0d229cff2d400e568e10b7764eb4e0903c66819a8fa99927249ab9b4c447b2d09ea0d98eb9823fb2c5f7462112036049795a5d8bd
-
Filesize
703B
MD5e2564fc59a86ea85b7485ab7288c68c4
SHA1bc1544d9a03d1adafe399067ac32bf8d1cedbdb0
SHA25668e8d8ef14bfbe96ebad3fb391fd4c1e57068a7f950dd31840884f6d58b078a8
SHA512e09c6741d99ec41763e939aa39adb4e0f8508d37556c52251eec268849e85960da42ace7e9b82f1927de5bcf29ebec205189b113d2bb123025f3e6615b28ff0a
-
Filesize
2KB
MD5f82bc8865c1f6bf7125563479421f95c
SHA165c25d7af3ab1f29ef2ef1fdc67378ac9c82098d
SHA256f9799dc2afb8128d1925b69fdef1d641f312ed41254dd5f4ac543cf50648a2f6
SHA51200a9b7798a630779dc30296c3d0fed2589e7e86d6941f4502ea301c5bce2e80a5d8a4916e36183c7064f968b539ae6dac49094b1de3643a1a2fedc83cf558825
-
Filesize
3KB
MD5558e454bc2d99d7949719cf24f540dd2
SHA1e9c772bcee4ae780cdc28b0b4876385639e59b39
SHA256677ec2cfe2ae99352aa12ac658d01a7bb0b51cf3cd2c568e94a78754326ca43a
SHA5125bb10dcf81ccab0b7e2274d3ccdbda5a38014576096fef71725cfa6e16a4bfd29f481f3bc5ad15426fb9918eeca67fff11291a88caf10974433214674c1c1b64
-
Filesize
784B
MD55a466127fedf6dbcd99adc917bd74581
SHA1a2e60b101c8789b59360d95a64ec07d0723c4d38
SHA2568cd3b8dd28ac014cf973d9ab4b03af1c274bbc9b5ee0ee4ab8af0bdb01573b84
SHA512695cafc932bc8f0a514bc515860cb275297665de63ca3394b55f42c457761ebf654d29d504674681a77b34e3356a469e8c5b97ff7efc24de330d5375f025cba5
-
Filesize
228KB
MD54dd70453aa7a3d53d0b0188fb4c798fb
SHA1e92ba1890868b76f0afcdd35c43ece3475f728ad
SHA256d7c6608fb7db4ccfb0aaa49322534e412147c41a14ce1e3c32285982952cc9aa
SHA51247023aad87a0ae65a7bded7d95a78ec92e658a87363515c99efb5293de5993689fc261f14c8147e3564529720443619aedba3ffcb4c4e67827d7ebf86cdb9ed4
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904