Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe
-
Size
250KB
-
MD5
0b97304b0d1cfae3693b8dee3fa147bc
-
SHA1
cd7638d4d1626e056a2ad5421f1d227a2bec1b95
-
SHA256
e238c162867402ca284a3f022fb118da398ec67f2cbb97f9312bdf335dae8fb1
-
SHA512
cc2a3e90e80770d4ee9c17236588b70fe5cf98133ef33fa00561e2d551d27d465568199ee07718d57defb158f7c643336e503799d7de1b56f5796e18d510e4b1
-
SSDEEP
6144:h1OgDPdkBAFZWjadD4s54H4pawTr+Mb5YMlU:h1OgLdaO4H4zr+MtYN
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00050000000194e2-77.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2244 511a0a33d2295.exe -
Loads dropped DLL 5 IoCs
pid Process 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 2244 511a0a33d2295.exe 2244 511a0a33d2295.exe 2244 511a0a33d2295.exe 2244 511a0a33d2295.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mpckkibddhgoafpaimmenponkiccellk\1\manifest.json 511a0a33d2295.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A48623D4-8413-63EF-5077-93E99D015039} 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A48623D4-8413-63EF-5077-93E99D015039}\ = "Zoomex" 511a0a33d2295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{A48623D4-8413-63EF-5077-93E99D015039}\NoExplorer = "1" 511a0a33d2295.exe -
resource yara_rule behavioral1/memory/2244-79-0x0000000074B70000-0x0000000074B7A000-memory.dmp upx behavioral1/files/0x00050000000194e2-77.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511a0a33d2295.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0006000000018d63-30.dat nsis_installer_1 behavioral1/files/0x0006000000018d63-30.dat nsis_installer_2 behavioral1/files/0x0005000000019501-100.dat nsis_installer_1 behavioral1/files/0x0005000000019501-100.dat nsis_installer_2 -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\511a0a33d22cc.tlb" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039}\InProcServer32\ThreadingModel = "Apartment" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039}\ProgID 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\511a0a33d22cc.dll" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039} 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039}\ProgID\ = "Zoomex.1" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039}\ = "Zoomex" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{A48623D4-8413-63EF-5077-93E99D015039}\InProcServer32 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 511a0a33d2295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" 511a0a33d2295.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 PID 2792 wrote to memory of 2244 2792 0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID 511a0a33d2295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{A48623D4-8413-63EF-5077-93E99D015039} = "1" 511a0a33d2295.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b97304b0d1cfae3693b8dee3fa147bc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\511a0a33d2295.exe.\511a0a33d2295.exe /s2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5f3c79bda3fdf7c5dd24d60400a57cadb
SHA11adb606aaeedb246a371c8877c737f0f8c798625
SHA256a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\mpckkibddhgoafpaimmenponkiccellk\1\manifest.json
Filesize498B
MD5752d78b22ca69feaeabc01f6940490a2
SHA1d5ee8090539afcf003a3af613cd81152e606d746
SHA25619510ad9e47309d360e81f3403ed0ccbabb44b2c99e22db9abaee603492a99d1
SHA512716544237f290d86a47791cd18341a8e4df38a19021de2d7be0285c3bfacc59fc5b4ecba607e0802fd7d16715e69519e45dffc7b9cacea1f78e9e065000ee745
-
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\[email protected]\bootstrap.js
Filesize2KB
MD538d49de7b66de869546486cc4c5c7c69
SHA1758bec1406338e6336c664065642dcaec1f3bd96
SHA256dd2b4679ca229ab478dc297fb2dac9e6919992821de9c4182187e3f1ef67c334
SHA512f1ba47233b22b1ac92a45cf1407c559eb0c3d978259c950654b07c9068a61a1756245ed339dfeaeb2bda9432ecf97fc17195daf156d7acb9d5fec14aadaa6b5f
-
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\[email protected]\chrome.manifest
Filesize116B
MD5faf48d89f7f572fd23d9c7d3a785b15d
SHA17f8873290c8ec42735baaa5b69fd4cdbb70a956d
SHA2562181f9aa69ae58afe5f24e5cc368975ed5c34f0c2a2ab4f7a49df4174a5baed3
SHA51238e7371587822ea06a421944e9ce96e2abb12739d9dbf4f8ec166a1a9b516981ae91565f5f368aa333ad669671bc85082636bcc6249c5d87edcb9343aba2bbcd
-
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\[email protected]\content\bg.js
Filesize8KB
MD5050cfd7eb29d9add3d7bc9a26c5442dc
SHA18b457628d7616be74559cb29ed8b6134d1d14ce9
SHA2561d8d6a552e4def43dfcfbf9791c08e1145c8472f6c1245ccc891932be5186782
SHA5120fbf89241944d08e8ef6132201930d355cf8f39a50422ec3aa4b1257e827fdb3e21ce5c66ab9d2ac124a406368e7fd7fc91f48386631a6199fa474141b037470
-
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\[email protected]\content\zy.xul
Filesize225B
MD54864130b8ed3263bfb5454ba5b4c6b4c
SHA1d9710c6e7d917697b99b4f967272d5257d1b1002
SHA256b9a4f30b9c82da17c76dcc88a0f231c58c077299d7f22b4ec93f8eae98f9cf51
SHA512e551a9229224d628ed9ba517554fdb950f12569207ff47267d5a047328aecc809c7162f22ac4add2b597b755ffd26c277229eba00ab16f6882de33d4adba663e
-
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\[email protected]\install.rdf
Filesize700B
MD5e3025664541096ad0ada2bf7400f65ed
SHA1da5d250475e88492f66e48950f96d09ec878f6d4
SHA256f43f19beeda919806211565ec7c15a16ba1ab69e679d93b9b74bc978adabe8ae
SHA5128ed036ed55e43d839014a043df51d83d6ca44ec2cf166c2329444fa813d7ce9d9ac48c57d9add82f3046fd1b4448fff8b62c335de437cd34d5c6e98f638ef51a
-
Filesize
118KB
MD544f1dc155d3d083b677f20ed0fab8404
SHA1a696c5a0d50145afde3d3a71f70b1c3006ac2199
SHA25667014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470
SHA51204a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6
-
Filesize
2KB
MD5c749bca713cf6481411b5c4eaac4506a
SHA1539cb813dea7e37eff8c1b696eb0ab42c815ab62
SHA2560a94d2086eb6ac57ba5ee365d3f6f64f33e7c8d18419f04715460bc04ebddf2d
SHA51211b3b333b97b1bbbbbf01b6d367188698470877e180a3854ec9762f706755156136b404f2b95a7304a890686d8f5f697232e6c28497aca20e0aa76988b0f179a
-
C:\Users\Admin\AppData\Local\Temp\7zS8AA3.tmp\mpckkibddhgoafpaimmenponkiccellk\511a0a33d20bc5.15881023.js
Filesize4KB
MD5f479600263d4a55241aac4334a5b9647
SHA1239175019051cc338803ff4b2b002840f61061f7
SHA2566bcb61eac06f3b34e9c42ee6b4eed101658a57fce37237031a5f236e0fd7edeb
SHA5123a04e03759a7282019fab7bf2d01364984534aa96c0137ef7370b6932548ed12f9b93055bd30a703029f2fce0c4f16770feb917f003fb5d52f481cde0faf1e8c
-
Filesize
161B
MD5bc463d741e8d57256bb99e426a2cc9db
SHA196c4ac393ec2d7866914f9a78c53b1649ed27849
SHA25626a5dbe7cc93dcfa7646bc5564cc77b99eddec52a51b105dcc0fc3f10586421d
SHA5122f91bbfb75c6f0a8558ab7f8c1cecc49af79ab459045416dde0513bbbd850a666a3b91080b311877cfe14b29e7b0d45dc72ebd8435da046b5943721bed083555
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
1KB
MD5f4e9258641d4084da31c2045378e4f55
SHA145d6c27186482ea383182387685d547364d82a04
SHA256702af40e4aded5200b23dbbb40a70e61c8afbcd675ffb2fc67bdd6355550cdb0
SHA512412cada11212be7b38bb2bd05150b8f9835d853d00ae753a8b05cee96328c843946a42b19f5d74c97bcd49a5d63a8f6e2df94dfc1ea5cd5dcc6c6827afe3cda9
-
Filesize
6KB
MD59e69a2f06f12783a9ffb69fd06aa9383
SHA199dba2c2ec06ab3b549a4da588aa553ddf50ee99
SHA256c445959184fe89d5038d4e66eeddf6e6d42fee5316d8009977a8778cecf7d457
SHA512d5e6400a5a8cd40a12217075cb10783fd627c8066e5ba8444958ebfaff44356cbd145c25fb418d6010c4a21ed048fe11b19d63821250b70cc9c0b760e4276239
-
Filesize
71KB
MD5b78633fae8aaf5f7e99e9c736f44f9c5
SHA126fc60e29c459891ac0909470ac6c61a1eca1544
SHA256d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA5123885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
7KB
MD5b9cd1b0fd3af89892348e5cc3108dce7
SHA1f7bc59bf631303facfc970c0da67a73568e1dca6
SHA25649b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90