Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/coelenterates.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/coelenterates.dll
Resource
win10v2004-20240802-en
General
-
Target
102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe
-
Size
802KB
-
MD5
102c9d8d99c9f453053d1f49620df11f
-
SHA1
47ab2f2f660832e3a38f6dee882431a5a2404729
-
SHA256
cdaf240960ef6c5d9b81b9843bafaa56700e8fa848dca85cb401061d22f5ec27
-
SHA512
adbe66cb6be6cbc082cda769caed32bd8bd8c514dfc229c54ea173385cfa4ff713b60327f550e27229732f2c1382e0038fe40c8ba16a5d0f5d44314a3a70a04e
-
SSDEEP
12288:FgORozerFqm6tU2L6kwt0Z9YlU+iyKAqYpBuT+ZlI4O3dRvUC8yr3e9JKjv6JfPf:FZRFxVYJL7jYlU3vAqYphHcLmwCdSRkj
Malware Config
Extracted
C:\ProgramData\pjhsmgj.html
http://tmc2ybfqzgkaeilm.onion.cab
http://tmc2ybfqzgkaeilm.tor2web.org
http://tmc2ybfqzgkaeilm.onion
Signatures
-
CTB-Locker
Ransomware family which uses Tor to hide its C2 communications.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\International\Geo\Nation shwavsm.exe -
Executes dropped EXE 4 IoCs
pid Process 2912 shwavsm.exe 2400 shwavsm.exe 2420 shwavsm.exe 1884 shwavsm.exe -
Loads dropped DLL 15 IoCs
pid Process 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 2912 shwavsm.exe 2912 shwavsm.exe 2912 shwavsm.exe 2912 shwavsm.exe 2912 shwavsm.exe 2400 shwavsm.exe 2420 shwavsm.exe 2420 shwavsm.exe 2420 shwavsm.exe 2420 shwavsm.exe 2420 shwavsm.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-18\desktop.ini svchost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\READ-ME-FIRST.txt shwavsm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\READ-ME-FIRST.txt shwavsm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat shwavsm.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Documents\\!Decrypt-All-Files-qzkxtzd.bmp" Explorer.EXE -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2980 set thread context of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2912 set thread context of 2400 2912 shwavsm.exe 34 PID 2420 set thread context of 1884 2420 shwavsm.exe 39 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-qzkxtzd.txt svchost.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\!Decrypt-All-Files-qzkxtzd.bmp svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shwavsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shwavsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shwavsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shwavsm.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0009000000012117-35.dat nsis_installer_1 behavioral1/files/0x0009000000012117-35.dat nsis_installer_2 -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1088 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main shwavsm.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch shwavsm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" shwavsm.exe -
Modifies data under HKEY_USERS 23 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Empty = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2d3224fe-69b6-11ef-a892-ea7747d117e6}\MaxCapacity = "2047" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\LastEnum = 30002c007b00630038006100610033006200650034002d0036003900650064002d0031003100650066002d0039003700630039002d003800300036006500360066003600650036003900360033007d00000030002c007b00320064003300320032003400660065002d0036003900620036002d0031003100650066002d0061003800390032002d006500610037003700340037006400310031003700650036007d0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\ = "%SystemRoot%\\System32\\imageres.dll,-55" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon\Full = "%SystemRoot%\\System32\\imageres.dll,-54" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c8aa3be4-69ed-11ef-97c9-806e6f6e6963} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c8aa3be4-69ed-11ef-97c9-806e6f6e6963}\MaxCapacity = "14116" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\TileWallpaper = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\Desktop\WallpaperStyle = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2d3224fe-69b6-11ef-a892-ea7747d117e6} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{2d3224fe-69b6-11ef-a892-ea7747d117e6}\NukeOnDelete = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{c8aa3be4-69ed-11ef-97c9-806e6f6e6963}\NukeOnDelete = "0" svchost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3004 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 2400 shwavsm.exe 2400 shwavsm.exe 2400 shwavsm.exe 2400 shwavsm.exe 1884 shwavsm.exe 1884 shwavsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2400 shwavsm.exe Token: SeDebugPrivilege 2400 shwavsm.exe Token: SeShutdownPrivilege 1212 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 shwavsm.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1884 shwavsm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1884 shwavsm.exe 1884 shwavsm.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2980 wrote to memory of 3004 2980 102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe 31 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2848 wrote to memory of 2912 2848 taskeng.exe 33 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2912 wrote to memory of 2400 2912 shwavsm.exe 34 PID 2400 wrote to memory of 592 2400 shwavsm.exe 9 PID 592 wrote to memory of 1708 592 svchost.exe 35 PID 592 wrote to memory of 1708 592 svchost.exe 35 PID 592 wrote to memory of 1708 592 svchost.exe 35 PID 2400 wrote to memory of 1212 2400 shwavsm.exe 21 PID 2400 wrote to memory of 1088 2400 shwavsm.exe 36 PID 2400 wrote to memory of 1088 2400 shwavsm.exe 36 PID 2400 wrote to memory of 1088 2400 shwavsm.exe 36 PID 2400 wrote to memory of 1088 2400 shwavsm.exe 36 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2400 wrote to memory of 2420 2400 shwavsm.exe 38 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 2420 wrote to memory of 1884 2420 shwavsm.exe 39 PID 592 wrote to memory of 2912 592 svchost.exe 40 PID 592 wrote to memory of 2912 592 svchost.exe 40 PID 592 wrote to memory of 2912 592 svchost.exe 40
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}2⤵PID:1708
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding2⤵PID:2912
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\102c9d8d99c9f453053d1f49620df11f_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {767C615B-4767-4933-B60A-0C3BD25F12AF} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\shwavsm.exeC:\Users\Admin\AppData\Local\Temp\shwavsm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\shwavsm.exe"C:\Users\Admin\AppData\Local\Temp\shwavsm.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows all4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\shwavsm.exe"C:\Users\Admin\AppData\Local\Temp\shwavsm.exe" -u4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\shwavsm.exe"C:\Users\Admin\AppData\Local\Temp\shwavsm.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1884
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD54bded89bc7ce48879a6efb32c94f58f7
SHA182945c9dcd50abceeb3df145d559de2a7f0a0852
SHA2562dea8862bd9b6384b831e4695781b82b2fd5d9f9d5797f12f8c370a49b14f50d
SHA5125e6215f02d92ffe1170c18a393a73b503cd1d190c8ae6b1526a87fe0ad323742b82e76d6a641c287b05889cdd64db65ebbad5ac1036fef4e6c66e09dff293e24
-
Filesize
654B
MD591738bc8d59f8e75d4b82192abc552d6
SHA18e114316549771f291b271a158da4c8a46f48cde
SHA25636e2413e78349eb0acd51079a7a1375f51e385a74f884ff77560cdad50524ca8
SHA5126c6546ed7eae075884dbe590d6be4c352e3932bda86afbed574012e2b5a5f915be097c0a3260129a999a40a1a69af34a2ba37b409242135464f3b45c66e68d23
-
Filesize
63KB
MD58c30685f63195c05a333d6eddf54ba9c
SHA123ad6c8128a372a3bcc00e4101f30216f57bb6f3
SHA256e32783b537cb4e6882b2bd88c75ff352b2f9c52f8f24354790e177cab425b851
SHA512dac2987c5e7e05d11bf07fd0792f5ca5e23362f01ef135e58ba1262408bf04e51331b668f5d29e62ce1ee65e407c736f8f09f954e4c4e7ee6bbdcef6aa9c3223
-
Filesize
802KB
MD5102c9d8d99c9f453053d1f49620df11f
SHA147ab2f2f660832e3a38f6dee882431a5a2404729
SHA256cdaf240960ef6c5d9b81b9843bafaa56700e8fa848dca85cb401061d22f5ec27
SHA512adbe66cb6be6cbc082cda769caed32bd8bd8c514dfc229c54ea173385cfa4ff713b60327f550e27229732f2c1382e0038fe40c8ba16a5d0f5d44314a3a70a04e
-
Filesize
654KB
MD5344689f5946142895cc657fb63041440
SHA1b59c03f39c9dca8ce57dc505d155b54ab0571166
SHA25673d6024f6026b7bc77010a5a957e70910ecce31fddc9f09bf2d5d3256f0c0a1c
SHA5120796f9f3c91938d386bd2cb7d251535e71a8f3ef345cb9d4dba5dd3115a03321692b768e9f7010f76268ca9e5939f83ffbad106d5928a08af8f3f9bfd7862975
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
4KB
MD5d9a3fc12d56726dde60c1ead1df366f7
SHA1f531768159c14f07ac896437445652b33750a237
SHA256401f1a02000ff7cf9853d964dcba77e6f0fa8e57256b11ed3c01171d7a97388a
SHA5126b06e3446df419151dd20cdb1d9c595fe9fb0972e7dfc50dadeea9f868d8ef0cd4cefcb18c7ebfc0d2a3e9171f8aa1f9fe762f54c374667f6060e8ce7e845f51
-
Filesize
382KB
MD5f2ce2e755d4f18546550ae4a7f2a6626
SHA12d4c874c00dc8006a75bd8e700d77952a08d101f
SHA256aa237a70b8b8c08f00bb26fa5c9529b2a41e20222c18d40244459baad2fed3c7
SHA5125cb452aaf18ee58bb49fd03581c58f8edd5d9c9c087f95b29638069c6fa5ea08999fc29bee8c95d3f346e979a9fa42f59a01e41f1019c5ea58725ef2567e9855