Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe
-
Size
121KB
-
MD5
40cbdbfc0a84ae4d01c65dbb3c0cb540
-
SHA1
3f956277169858741c8404e56fdbaa6e721887de
-
SHA256
41d31d40c2d0fe5a7e00460144cf7b3457b870c60a485dade9057d99211824d3
-
SHA512
b4fbf352347002be2efdf5e8b04146c1490e09eb7af21cc5bafd23e46a60f0c4d700b6ab5cfc237b8b74fd40d2f9d121695e30325f261c4573bc5bfdc47724bd
-
SSDEEP
3072:rR2xn3k0CdM1vabyzJYWql6xfa+atPmJuUH:rR2J0LS6Vl649IH
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 596 WaterMark.exe -
resource yara_rule behavioral2/memory/776-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/776-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/776-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/596-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/596-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/596-24-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/776-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/776-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/776-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/776-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/596-36-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/596-37-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxCF94.tmp JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4512 2680 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2121991032" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2119334902" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2119334902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2121991032" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153124" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A9F4DC20-C7D7-11EF-B9D5-EE81E66BE9E9} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442456430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2119334902" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153124" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153124" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A9F73E56-C7D7-11EF-B9D5-EE81E66BE9E9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153124" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2119334902" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153124" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe 596 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 596 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3588 iexplore.exe 3708 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3588 iexplore.exe 3588 iexplore.exe 3708 iexplore.exe 3708 iexplore.exe 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 5008 IEXPLORE.EXE 5008 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 776 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 596 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 776 wrote to memory of 596 776 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 82 PID 776 wrote to memory of 596 776 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 82 PID 776 wrote to memory of 596 776 JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe 82 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 2680 596 WaterMark.exe 83 PID 596 wrote to memory of 3708 596 WaterMark.exe 87 PID 596 wrote to memory of 3708 596 WaterMark.exe 87 PID 596 wrote to memory of 3588 596 WaterMark.exe 88 PID 596 wrote to memory of 3588 596 WaterMark.exe 88 PID 3588 wrote to memory of 1480 3588 iexplore.exe 89 PID 3588 wrote to memory of 1480 3588 iexplore.exe 89 PID 3588 wrote to memory of 1480 3588 iexplore.exe 89 PID 3708 wrote to memory of 5008 3708 iexplore.exe 90 PID 3708 wrote to memory of 5008 3708 iexplore.exe 90 PID 3708 wrote to memory of 5008 3708 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_40cbdbfc0a84ae4d01c65dbb3c0cb540.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2044⤵
- Program crash
PID:4512
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3708 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3588 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2680 -ip 26801⤵PID:1348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD540cbdbfc0a84ae4d01c65dbb3c0cb540
SHA13f956277169858741c8404e56fdbaa6e721887de
SHA25641d31d40c2d0fe5a7e00460144cf7b3457b870c60a485dade9057d99211824d3
SHA512b4fbf352347002be2efdf5e8b04146c1490e09eb7af21cc5bafd23e46a60f0c4d700b6ab5cfc237b8b74fd40d2f9d121695e30325f261c4573bc5bfdc47724bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5febff5e5b64433316ee5f116c5c14309
SHA155a533777edeed0d18304f073d59d5ca1e5c7737
SHA256888dd735b3cf97e714243c7ecf44064128c4a97452b90ebbc66e317a113ef9a4
SHA512cbadeca5bbd2528b4af7ad6d053483adac27db83bfcd8b75312a5aa4b09302f729b67a04bbb9af840cb3abd78ec668b5a6c8746685ba0f15780b5e0ea3dd88d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD580dbc4a8f8830a217ebc13f572d56f42
SHA13edfca1467c34d82561239cf9c8c70703b234910
SHA2567c4319d17d1a210037a237fbc85e646f6e585daf0e37b13f286d037a6c9e952f
SHA512b8d9a439477b621bbead53588f12f8b4d53929dc75b9a15626b9e4e5a760b692d53dae814351705a448cdaf420efb13825a8d87367b67ad2683537a6a49c06d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD534cf6042e2ecfe85e9e95b4be3371942
SHA1f33eb518ef5dc73b3c3a901ad666319e2e2831d9
SHA256df746745fc20ef541d9ef9af242be33f628f77ba79629f79c497a4614d27e69c
SHA5125753246c5453090e6da54f6f815180155d88414b80860619b775a3d090f8df93c5fa264db3041b7ec33febc5b72841756f8c26c81e1f6081580d6c2f421084cd
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A9F4DC20-C7D7-11EF-B9D5-EE81E66BE9E9}.dat
Filesize3KB
MD540151a3ca915f6dc612ecb7cea725713
SHA172eb45f27585f5507e1a08f5d4b71b9bd5fe6b93
SHA256c11cab98c256717841d9e5915ee822d17a08b568cbe4eb9c5c0a661770a09292
SHA512ae87d469059dd1dbe505cd1ec43e8a3b83ca098647dae7b8a5deee6f25526d342cb55e45a29acf474c8736f33fe14ca4a28cc79df8959c2f53e75c5577c6a0d5
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{A9F73E56-C7D7-11EF-B9D5-EE81E66BE9E9}.dat
Filesize5KB
MD5b9040bc16679aa461f907097fdd38acc
SHA10788900eb8cd3a685a80d9acc79f749b5fd642f8
SHA256de917c9626a4831a244ed696888c115e8815ea73061bc923be14701cfeb37d77
SHA51231ce3fbc4038415d8883b1ba1548bc505607e79bd94f888af7b5ff794422b57ef0684a4f7122696e48739385438ae9253c29d5eaf61d93615d49ac52462b73e3
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee