Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe
-
Size
6.6MB
-
MD5
fe05a91b9bcf2e18fe9338fdf8f8c1f1
-
SHA1
842d372833b32d3ce92ed8ccef68e96755844411
-
SHA256
1c37555242c8c8d418ac6d6b2d0240fc17feded112e03fd61858f7ccc220793d
-
SHA512
9eb4986a437dcf5aa96ceb600052c98d75299611c8e84469cff58a12d8af4d0ad4b1a06cb0bef3112d3bbcede556997c8a5957111b526a01b61abdb3d77f1498
-
SSDEEP
49152:qvRdZcp2MgBsbrMyufXCy2SD/fqtE8pqO4bCNL7IvpvPII4XaT5KZxTqbjRunPSV:o
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0007000000018663-21.dat family_ardamax -
Executes dropped EXE 4 IoCs
pid Process 1044 file1.exe 2716 WPMP.exe 2192 TeamViewer_Setup.exe 2600 TeamViewer_.exe -
Loads dropped DLL 15 IoCs
pid Process 1044 file1.exe 1044 file1.exe 1044 file1.exe 2192 TeamViewer_Setup.exe 2192 TeamViewer_Setup.exe 2600 TeamViewer_.exe 2716 WPMP.exe 2716 WPMP.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe 2600 TeamViewer_.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WPMP Agent = "C:\\Windows\\SysWOW64\\28463\\WPMP.exe" WPMP.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\WPMP.001 file1.exe File created C:\Windows\SysWOW64\28463\WPMP.006 file1.exe File created C:\Windows\SysWOW64\28463\WPMP.007 file1.exe File created C:\Windows\SysWOW64\28463\WPMP.exe file1.exe File created C:\Windows\SysWOW64\28463\key.bin file1.exe File opened for modification C:\Windows\SysWOW64\28463 WPMP.exe -
resource yara_rule behavioral1/files/0x0005000000018e9f-45.dat upx behavioral1/memory/2192-53-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0005000000018ed5-64.dat upx behavioral1/memory/2192-68-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2600-72-0x0000000000400000-0x0000000000449000-memory.dmp upx behavioral1/memory/2600-300-0x0000000000400000-0x0000000000449000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WPMP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeamViewer_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TeamViewer_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 42 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\InprocServer32 WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\ProgID WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\25" WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\FLAGS WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\InprocServer32\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\InprocServer32\ = "C:\\Windows\\SysWOW64\\tdc.ocx" WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\ProgID\ WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Programmable WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\0 WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\0\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\HELPDIR\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\ProgID\ = "TDCCtl.TDCCtl.1" WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\ = "GrooveStorageSecurityContextPrivate" WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Version\ = "1.0" WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Control WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Implemented Categories WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\ WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\0\win32 WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\FLAGS\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\TypeLib\ = "{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}" WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\VersionIndependentProgID WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\VersionIndependentProgID\ WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1} WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\FLAGS\ = "4" WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\HELPDIR WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Version WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\MiscStatus WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\MiscStatus\ = "0" WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Version\ WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4} WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Control\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\MiscStatus\ WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0 WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\TypeLib\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\ = "Zazap.Axiqe class" WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Implemented Categories\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\Programmable\ WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{63248E0D-94A9-BAD7-A4A5-01F263EC02F1}\1.0\0\win32\ WPMP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\TypeLib WPMP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B28B4A46-686C-499A-528D-AF4BEAA28CD4}\VersionIndependentProgID\ = "TDCCtl.TDCCtl" WPMP.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 TeamViewer_.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: 33 2716 WPMP.exe Token: SeIncBasePriorityPrivilege 2716 WPMP.exe Token: SeIncBasePriorityPrivilege 2716 WPMP.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2716 WPMP.exe 2716 WPMP.exe 2716 WPMP.exe 2716 WPMP.exe 2716 WPMP.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 468 wrote to memory of 1044 468 fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe 30 PID 468 wrote to memory of 1044 468 fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe 30 PID 468 wrote to memory of 1044 468 fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe 30 PID 468 wrote to memory of 1044 468 fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe 30 PID 1044 wrote to memory of 2716 1044 file1.exe 31 PID 1044 wrote to memory of 2716 1044 file1.exe 31 PID 1044 wrote to memory of 2716 1044 file1.exe 31 PID 1044 wrote to memory of 2716 1044 file1.exe 31 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 1044 wrote to memory of 2192 1044 file1.exe 32 PID 2192 wrote to memory of 2600 2192 TeamViewer_Setup.exe 33 PID 2192 wrote to memory of 2600 2192 TeamViewer_Setup.exe 33 PID 2192 wrote to memory of 2600 2192 TeamViewer_Setup.exe 33 PID 2192 wrote to memory of 2600 2192 TeamViewer_Setup.exe 33 PID 2716 wrote to memory of 2144 2716 WPMP.exe 34 PID 2716 wrote to memory of 2144 2716 WPMP.exe 34 PID 2716 wrote to memory of 2144 2716 WPMP.exe 34 PID 2716 wrote to memory of 2144 2716 WPMP.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe05a91b9bcf2e18fe9338fdf8f8c1f1_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\file1.exeC:\Users\Admin\AppData\Local\Temp\\file1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\28463\WPMP.exe"C:\Windows\system32\28463\WPMP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\28463\WPMP.exe > nul4⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\TeamViewer_Setup.exe"C:\Users\Admin\AppData\Local\Temp\TeamViewer_Setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version5\TeamViewer_.exe"C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version5\TeamViewer_.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5ab45e9a5e5de0ef88f13a2e121470cb5
SHA18bfb8c495ac515bac6a6798454dc6162c87f3e0a
SHA256620d88abcae44c3b00decf90aaec4bdca29ec442aa189f52ae6325250f50e1ff
SHA512d45a9d1d589baff58b59668ced65d3b42af8121c7378130a5bdf63332d111611b01cb21b1ce93f38f534ee1408e6512ef3e6db295ae394378408ef57074b2a81
-
Filesize
2.5MB
MD55392099ad5d282c1ed93aa13a47c60c5
SHA113e6fa57fe6c34bba2a85868d388628e147f6b42
SHA256f2e9f8830a2b20609b7f59a9a8051eefb5b541e341cf3f6ebc5220565041bf43
SHA5129096bceed15374d49446de5e71741a3ab4d07a12619c920fafcad07ea1ce27ee529cbb5878f03a3e59cd75160b0bd9cad18a285e2d6f4ccc413cc15adda08002
-
Filesize
3.1MB
MD56293fde559f4e3c05af389fd0d17d096
SHA13fe6f62a15d87e56f7b736de2a4b43a446423c69
SHA2569d4585b50086c1c6631590f6adb97ce85b5449d2b09b1f471c16e93e68e17f69
SHA51286f500470e85d03f21bd7d0b3669d3fac99db9b13bf932cdfc7f1c2e267d3ed283a6b65ca3f51a6d9925dc5c95e04ec1642a91a736a7b3445a4d6c05abb66d4e
-
Filesize
661B
MD5d49491c7ba7bd565e1b8ff473cd84c8e
SHA12522272cf01af17f8ace15a29759f7629ebdc94e
SHA2560be1c22c6f540d98cd55d7f434f57aedffc67a19df4e4957f75eb034a7b3d9bb
SHA5122207da44794bd8b8ed1161a0a1990d13824c91b651711d20fbd14769f898a95168884e217f24465b309901215961f3bcb287214b61c5ce2fbc020e8e21cb7b3c
-
Filesize
975B
MD569a491a30f8fd22d3210847d54274a19
SHA17e19eb2b1424bb487708f91001d0a001e214ebb8
SHA25649a8ab22496032d8286c7fa71d1e5fc3f13079572d45e4140d1b24be57202b53
SHA5124ac8b38c91eb466cc31e8256cd7a59bf10ff088a3ff233510277be969134c7da2c784fb1254323c2a3e502d2daa98561c160d321a153914b65f97c6bec79207b
-
Filesize
1005B
MD5fb750a79aaa69b9fdc4f2c3deee277a2
SHA15e0779902765a8e446c208b34e80553e5255720c
SHA256fe5d47d860d100107578b4ba90c625c7be01427281f5045a04c02a26285ea915
SHA51242c40b044b07c05e1db2c4bb50234f526d860a3b96ab27016ed37a22f177fb6da52804bf7a135fa45cabe48e0145129584be29584aff3e7ccb6ba3cc7fbb81c8
-
Filesize
983B
MD51885c519ebff7baf0ae16252235f497b
SHA1b997c1bf6649b9501ea3245fe422a0048e394a9f
SHA256ce453ca6b1afcdcdb73ff85bd7494b68c58fd86c845468ecebf27f6fbdf9eb47
SHA512f14df980b74f909d8d8950aa60ca2d08e2341a2c47ac307af39e586e3b44ebc7abe61d59828f73b86875af268f19b583de7917b744827b8632ed3be54c74683f
-
Filesize
1KB
MD559f000db1bbc21d21cff3f09e875ff39
SHA10c2ce09c52e80dc7f05a5f39a8bbf2716f9ca675
SHA256bfeb865b6e8fe4f3954dc6fd8f8ff5232b12fa60f87bf0178339316b80de0449
SHA51231f39697f96b19ce01e6acda6e6d1f5eed7aec8431bcc6c2a2368e990cbdd75b52d832ec5a853bde8bead02e0febe1bbb1f8c4ef7e8139da14ecc686e2d7acdb
-
Filesize
370B
MD53847fbfbf16f87a8c37c240012f0383d
SHA101e24c3f8501c5ffeb47fd2159a048c60a4cbeb3
SHA256b501fba824b474b1d6d418a32f5d3df0d160b8b084b82969a24898a977ef981c
SHA5121415aa918d420fb3fad575dd8b99a3b5d8b95316fda5e31678d9d8d59ee3445a5e4e37e9cdabe10b4ec328adbfd3e7b68211673d27a83acd1d9d93b6f6b578cd
-
Filesize
5KB
MD5603451f504bedb28c3a7bae4c89abf24
SHA1cbfe12186b54663f60663c349739c7a49950c44e
SHA256e4d6577ea390274308877284b6d0cd6672aeb0e76c9c9847ac59c0964f050d13
SHA512136e28e288b3ce26b37c82b078a3440e3232c0f874d7d33e8e6fb6eadfd0024b9009448500c716523b81f142fa3bebf7d11f1dd3e8e6143867b06335eb5f9612
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5f1cf9fcbddeadabb738de497ffefdced
SHA17385a7c87e245da89cc5ef8f9295678c1566f25d
SHA256086083bc73b14286f9c3c29df8b8dc6f014d8b084267fbaeee0af56344d1f779
SHA5123a3b9d279b4c131ef3f358e0163f60ec9e60160a2cc45488adb915fea6642f3df5d35da2ccb6983d790401d237fbc808829f42c42ef958e7a0eac98fc33bb3f6
-
Filesize
49KB
MD549626ee03cff91a643763ced5b363572
SHA1fe921efdab33cbb77587f79b27ce2e65cdc7826d
SHA256d550cbdabdad3e0f3349310e1af077cc06384bd0988350af6887d9c4852c8943
SHA512cdc7a07c150e5b1b4bc4be860d4fc7bd5e452b372a0b541518072eab32e99f97f36abd84f4c6782fe382b0f2ff5cd4131d34a175896d8eb0c36bc45b009faf57
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
4KB
MD51e8e11f465afdabe97f529705786b368
SHA1ea42bed65df6618c5f5648567d81f3935e70a2a0
SHA2567d099352c82612ab27ddfd7310c1aa049b58128fb04ea6ea55816a40a6f6487b
SHA51216566a8c1738e26962139aae893629098dc759e4ac87df3e8eb9819df4e0e422421836bb1e4240377e00fb2f4408ce40f40eee413d0f6dd2f3a4e27a52d49a0b
-
Filesize
8KB
MD531854a50b294dd312eb7fa9eb1c99537
SHA1e0b1682a001e15d0e0e1c1ca732cafb5c80b3160
SHA2562fe2d55aae2deef38a37c9679d74ecf05699d6919760794f69583b43b7fe308c
SHA5120482a4981ba242d4e931bd8b9eb5d606492cffb7609fb69fb349ed19c7a9e36a7e240e5ebe759505d253c5e72fb771612a76419c36fb035987a166569a5111c2
-
Filesize
648KB
MD5ce568bcaf7285124f764aff92f5079d4
SHA1886f698e2239cf615f12b503853a5fa28c53aefc
SHA25659d7d6de8a9e2d5535703d22c36888889530fd011d7f71cf034e93e36e7527af
SHA5129f6e3496930cb5dd9c9403acc865bc94f63f64af49a27ffeedbc9d9082d50bff4a7a772bb98d4a2719f0ecae144393de9cc273ba83ae00abe347b0be0d7c9866