Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe
-
Size
792KB
-
MD5
bdd4cc3db4f1cd008d92fecc1323fb18
-
SHA1
0f5054ead0721a9197daef82a52120d8e58f5211
-
SHA256
771b17b8bd7f1a10429d713e30526135a814ee181b38210bcf72439fba3d2993
-
SHA512
2072e89de85b606c1a4e88b7e5177d907165d05b393be72721c3ff7eb8a228e3de773e867e3db06164118696f338c2395cc40ed87543345a9c6bffeb509fe2b4
-
SSDEEP
24576:C6rTTrLZt640HYTIegYgAAldoCXJK/KbhKMB:CCTPRmqAXoC80YM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 spoolv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\spoolv = "\"C:\\Windows\\spoolv\\spoolv.exe\"" regedit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 43 IoCs
description ioc Process File opened for modification C:\Windows\spoolv\control.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\users.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\mirc.ico bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification \??\c:\windows\spoolv bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\remote.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\users.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\spoolv.exe bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\spoolv.exe bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\mirc.ico bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\TMP3.$$$ spoolv.exe File created C:\Windows\spoolv\TMP5.$$$ spoolv.exe File created C:\Windows\spoolv\control.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\run.bat bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\reg.reg bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\mirc.ico spoolv.exe File created C:\Windows\spoolv\idents.txt bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\TMP4.$$$ spoolv.exe File created C:\Windows\spoolv\remote.ini spoolv.exe File opened for modification C:\Windows\spoolv\aliases.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\mirc.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\servers.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\ccc.mrc bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\reg.reg bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\ccc.mrc spoolv.exe File created C:\Windows\spoolv\TMP2.$$$ spoolv.exe File created C:\Windows\spoolv\aliases.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\mirc.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\remote.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\servers.ini bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\run.bat bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\TMP1.$$$ spoolv.exe File opened for modification C:\Windows\spoolv\control.ini spoolv.exe File opened for modification C:\Windows\spoolv\idents.txt bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\fullnames.txt bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\ccc.mrc bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File opened for modification C:\Windows\spoolv\mirc.ini spoolv.exe File opened for modification C:\Windows\spoolv\remote.ini spoolv.exe File opened for modification C:\Windows\spoolv\servers.ini spoolv.exe File created C:\Windows\spoolv\TMP6.$$$ spoolv.exe File created C:\Windows\spoolv\__tmp_rar_sfx_access_check_240618296 bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe File created C:\Windows\spoolv\control.ini spoolv.exe File opened for modification C:\Windows\spoolv attrib.exe File created C:\Windows\spoolv\fullnames.txt bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolv.exe -
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command\ = "\"C:\\Windows\\spoolv\\spoolv.exe\" -noconnect" spoolv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\EditFlags = 02000000 spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic\ = "Connect" spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\DefaultIcon spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command\ = "\"C:\\Windows\\spoolv\\spoolv.exe\" -noconnect" spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Application spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Topic spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cha spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chat spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Application\ = "svchost" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Topic\ = "Connect" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cha\ = "ChatFile" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chat\ = "ChatFile" spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon\ = "\"C:\\Windows\\spoolv\\spoolv.exe\"" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\ = "URL:IRC Protocol" spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\DefaultIcon\ = "\"C:\\Windows\\spoolv\\spoolv.exe\"" spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\ifexec spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ifexec\ = "%1" spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ = "%1" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\URL Protocol spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\command spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ = "%1" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\ = "Chat File" spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application\ = "svchost" spoolv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec spoolv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec\ = "%1" spoolv.exe Key created \REGISTRY\MACHINE\Software\Classes\irc spoolv.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2528 regedit.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe 2864 spoolv.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2864 spoolv.exe 2864 spoolv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4608 wrote to memory of 2000 4608 bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe 84 PID 4608 wrote to memory of 2000 4608 bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe 84 PID 4608 wrote to memory of 2000 4608 bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe 84 PID 2000 wrote to memory of 2528 2000 cmd.exe 86 PID 2000 wrote to memory of 2528 2000 cmd.exe 86 PID 2000 wrote to memory of 2528 2000 cmd.exe 86 PID 2000 wrote to memory of 2864 2000 cmd.exe 87 PID 2000 wrote to memory of 2864 2000 cmd.exe 87 PID 2000 wrote to memory of 2864 2000 cmd.exe 87 PID 2000 wrote to memory of 5032 2000 cmd.exe 88 PID 2000 wrote to memory of 5032 2000 cmd.exe 88 PID 2000 wrote to memory of 5032 2000 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5032 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bdd4cc3db4f1cd008d92fecc1323fb18_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\spoolv\run.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Windows\spoolv\reg.reg3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2528
-
-
C:\Windows\spoolv\spoolv.exeC:\Windows\spoolv\spoolv.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Windows\SysWOW64\attrib.exeattrib +H +S C:\Windows\spoolv3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5032
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD59e148b91fad20422c534814cfd1f783d
SHA1a10cdcef1e5cd0c0248dc090600ed2ae03b9279a
SHA256c313dde0fe9c8dea102c1db4b7944c89f9e4aec672bc66a0d3d12360ed8cfdc1
SHA5124e09ec3044d3711679b14c4876523983ae90177c6f15f0634e317a44d46ddb1adae7625c3cbe8d11650ef7b72cf8c976eb358e71f76c483196b65f314c426975
-
Filesize
9KB
MD54a10e3e0e7816bcabdd36f600558226e
SHA1c0bd4c2bc0b08c4e547242cff2e943433986fba8
SHA25640d1e0adbb667d9445c3f40e1d96e7aa41471f161ba1a685e167a83b9805c981
SHA5127c8600077e4b0a16ebb512f94b14ddf956b449b3d339335ae30bbd5c73354de87fa5cad7f98efe41c02f62eb133f1eebdff44bd8bed24735e69a3dce55922ea2
-
Filesize
42B
MD5405d882eed0cab5b915aa470a265dcc5
SHA17adfa3476bfc1c248619f0f78da6791faa7aa360
SHA25632680a610219e4de3cdfb104e71a9b3b1c86d3fb6c3f18328e6e161d2e3dff8b
SHA51203a5ce9a968196c605330e8e41a8df57ff86b1b60b60b38a453c13f469bd372679ff55f325cb336cb9c43db6d15b7554c7474fcc1f7515d8e4ef748d278ee723
-
Filesize
76KB
MD5604510c63582646e03f1d2e648f8b866
SHA17ba3a5d68d58c003d2383b8ed02bb88a61882ff9
SHA25699a8c4d6918c89193ac2b6e11d6dfc49dd197b6b69d020dbb7a04b36e33c9bf3
SHA512d27b2576361eee442ec0997adf0e1a7ee1b17dbfd1ad6bc29456eb60a2a84e4fd30e81c5ad095a745a71634eff883cba8d68666a21ba49c004544ae02d6197f1
-
Filesize
132KB
MD549bf0b00c3af898ba53352670a99d9d5
SHA105ff339132f58fd5ded52d6caf686fb6afd34f48
SHA256bcdac3b11b8f8238135b16e1e304ecfc75249cff67c148f800ba8c60c2c70800
SHA5126b729a533a6b344ae6954ef57d735d802389fa6da2bc1acf972b2762078121299f85bca50c6c154db1e1afe189c5eca8d9466f8f41231f196a14370e4c416ee1
-
Filesize
5KB
MD5e09aa9787af5cc53fd7525dd6693cf10
SHA157445d0779a66c61741822c0a7988573efee13d7
SHA256c7f023fc4c85680f5c334fef09155e81861634108140a5716a1395dd7cd62266
SHA512b71a8c0939d545afa173f107f99314848c6104928b77d6f39d6e4486ca2b65797cecff0f877160edf6ca1d21dca95b7f1be53221811c945f7c4be6e77a4d1f8c
-
Filesize
3KB
MD5bc99034df722b7f971e040408a4d0389
SHA12244eb8681bef577958d948a1695da806e543174
SHA25619501994e6de14f6164819ac0ee17343d17eedc0f13142dd280338546e92f213
SHA5121c8ba40c8b0ff063ee2ddd586e3efa0ed8ba48df8c274490c3910cb9917ee276a866bb9b6805477843ab0363488acf066795724871577864b757afb02d9e4d8a
-
Filesize
3KB
MD53d43c6451e61e72f18f45189798e0e4c
SHA19c899ffdf249e1d46ee1fea5a2e293cff9b8f17e
SHA2566638366c0a27072ba362e078e7c0891f3df30ba420754536c9f1249f4ffa177a
SHA512fc415fec817bc07bd2f0b1e6f6b38076d99ce71235af70392dacbc37160a6846bd02886644e05720545d8ad54de9a69adcd54c6664f6ecd37bfad5ac2463ef32
-
Filesize
3KB
MD5060aa57a583a9f085a64e32ac832ddb4
SHA108c0d1ac014854055324932524828fa864976ed6
SHA2569094a23863e531e7bf130812b3b3c793b9eda853ff193cae7f97978349a17f71
SHA5126459ab330aabf94956fa394f5347b7e62d7b87fe3280f0c59cce96d37d02d1339cbc51bf75f0efde0cdacc98015dafdfcea46003b361b1b822350ed2e3fc9adf
-
Filesize
3KB
MD5c0191031d352e047decf459502252e04
SHA1a2da243fce11241075d45a33336f0e7b467880d2
SHA25666f0d8323046c53c9d865a682d460d2ee6a3fe532b1ebeb224a4ec6e193affa0
SHA512e05a589c0d8e57d765ca8fe77499ed087a80254e9d84e780faadca0c1fcd363a8569f36b0acfd1beafae53283b1e0cccfcb6ceba0cbf311b08b44706217770c5
-
Filesize
3KB
MD5a04da21075614b33c3e8a73d42b15e13
SHA1f63a2ba0486ab4156d9af274c17affecbb9111e7
SHA256388bc2d7772e02dda18d0c51a1c12b7e370d6e34093cd6a662552d7b94cae2ea
SHA51204e0c22e14f5dc706161b38fc0eeefb718414522ca8956dd6cbd8553d92a3ef41a0ed7a92f59555af157fc0e4ae18d3f5bb813324ac4b3715aabfd7b7e5b36b0
-
Filesize
1KB
MD53aee26844ed0e98a2bc350b0bb8ed2eb
SHA128dc6eb9f9ba8e573370cba29049b63719beb633
SHA256a9deb575c465fa6a28bc38e2e61088a8f16ce30a94844cccf9abd4fe17876f43
SHA51270453a100fa5cfcaa7727308b6a2757016d90078ee583330dd0ad10eae1021a9314b0287389fad7fde817a97a62795838138aa5bc28fbf61e2fcdd2be80e2751
-
Filesize
882B
MD50c50f397f8202d830f3102619a4baeb3
SHA13b90db0c8c2e2bb5504f31814a61fbaf88cef283
SHA256f2120c3fac12eb56aea82912ca6c934525bbac642bb3a79d9147a694ad294b33
SHA512421feab3819c1b8e5bbb381eda9d761ff2194977c60056d48a2afe8229e6a5cb1ac50cd590f5740c84ada269f4450bdc2fb7f5179a80896c5b12bfaa12651237
-
Filesize
1.7MB
MD5b766003f431cad186bd115f5761592d1
SHA133cdfe6f7fa6b321f9a51cc051c32ba924164b10
SHA25622bdb2606020b82349a629248b599b64235c91e8b450e355a245ef09ece57e1d
SHA512d03cabf713c14a40588ec3d5d7c89be91a0bc2e7b472464ed058b2cce0afe58eaaf7386ce5e6297218b3e677e290625506760ad883412b7f94c3330aa9b9f834
-
Filesize
67B
MD5e2c6e41a58d2d119301fd0f86d6cd584
SHA13468d0db0ef6e10e1d3d42237e0a7f54a893b91f
SHA256c8e855ef54675e37d79b4e8c6cf67396800ed809e4b95d6deb7cce971acd2d93
SHA512c79a00db0aa1b182673917b5f28219fdba3b38d6c91c4e04bd71dd3d2b3db98529a506c3fd8dbf0a4a5760cb3c240e1aea9b4407081da591c39a43f0c5892b19
-
Filesize
135B
MD5ccb995d58bc99b34ea3fa3e97c5583e0
SHA1d72b86500a4a02fa7ad31b7933ce714d9abbe7c1
SHA25627948bfbbdeb54b01cd00ce467660b7a59e6019d9cd61b4e8d687829032a748f
SHA512898492b02492d0764ebf2218e2a2dfe29bcd97213fe577b2eae3b03a7c418d91fbb5b847f76c7e606ca8c95916a5de6423d3fb0a060f32fdc9080f19ada3b4dc