Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 12:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1991b20531b8eeb1f169385162661344.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1991b20531b8eeb1f169385162661344.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1991b20531b8eeb1f169385162661344.exe
-
Size
484KB
-
MD5
1991b20531b8eeb1f169385162661344
-
SHA1
d693bab1b874b4c30628cb46d4a8947230e479c0
-
SHA256
7a547cfb2c66c419bf311cd5bbc7c7f2c54ecb770c5564b4da0a35aebc116590
-
SHA512
29f0734c2e1ebf0055f9dbd8375f74061eee341f497ec994ae144df7df8b556786df495dfa2a21f8662abc69929be1aecce7738f893d50822cbb71f988150ce8
-
SSDEEP
12288:FdI9OjNJABliDhwbV1ToLJuflQtF9HwTNPgLFHAUU:Q9Oj4aVwxy95F9HONPgLFHg
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 13 IoCs
resource yara_rule behavioral1/memory/2664-42-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-38-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-49-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-50-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-51-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-53-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-55-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-56-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-57-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-61-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-64-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-65-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral1/memory/2664-68-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\firefox4.exe = "C:\\Users\\Admin\\AppData\\Roaming\\firefox4.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\firefox4 = "C:\\Users\\Admin\\AppData\\Roaming\\firefox4.exe" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD95D95B-1FFC-8CDB-D1DD-BCB8D6E8EB2E} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CD95D95B-1FFC-8CDB-D1DD-BCB8D6E8EB2E}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\firefox4.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{CD95D95B-1FFC-8CDB-D1DD-BCB8D6E8EB2E} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Active Setup\Installed Components\{CD95D95B-1FFC-8CDB-D1DD-BCB8D6E8EB2E}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\firefox4.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2664 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\firefox4 = "C:\\Users\\Admin\\AppData\\Roaming\\firefox4.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox4 = "C:\\Users\\Admin\\AppData\\Roaming\\firefox4.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1932 set thread context of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 -
resource yara_rule behavioral1/memory/2664-36-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-42-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-38-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-37-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-29-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-28-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-49-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-50-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-51-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-53-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-55-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-56-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-57-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-61-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-64-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-65-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2664-68-0x0000000000400000-0x000000000045D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1991b20531b8eeb1f169385162661344.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2600 reg.exe 2608 reg.exe 2260 reg.exe 1248 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2664 svchost.exe Token: SeCreateTokenPrivilege 2664 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2664 svchost.exe Token: SeLockMemoryPrivilege 2664 svchost.exe Token: SeIncreaseQuotaPrivilege 2664 svchost.exe Token: SeMachineAccountPrivilege 2664 svchost.exe Token: SeTcbPrivilege 2664 svchost.exe Token: SeSecurityPrivilege 2664 svchost.exe Token: SeTakeOwnershipPrivilege 2664 svchost.exe Token: SeLoadDriverPrivilege 2664 svchost.exe Token: SeSystemProfilePrivilege 2664 svchost.exe Token: SeSystemtimePrivilege 2664 svchost.exe Token: SeProfSingleProcessPrivilege 2664 svchost.exe Token: SeIncBasePriorityPrivilege 2664 svchost.exe Token: SeCreatePagefilePrivilege 2664 svchost.exe Token: SeCreatePermanentPrivilege 2664 svchost.exe Token: SeBackupPrivilege 2664 svchost.exe Token: SeRestorePrivilege 2664 svchost.exe Token: SeShutdownPrivilege 2664 svchost.exe Token: SeDebugPrivilege 2664 svchost.exe Token: SeAuditPrivilege 2664 svchost.exe Token: SeSystemEnvironmentPrivilege 2664 svchost.exe Token: SeChangeNotifyPrivilege 2664 svchost.exe Token: SeRemoteShutdownPrivilege 2664 svchost.exe Token: SeUndockPrivilege 2664 svchost.exe Token: SeSyncAgentPrivilege 2664 svchost.exe Token: SeEnableDelegationPrivilege 2664 svchost.exe Token: SeManageVolumePrivilege 2664 svchost.exe Token: SeImpersonatePrivilege 2664 svchost.exe Token: SeCreateGlobalPrivilege 2664 svchost.exe Token: 31 2664 svchost.exe Token: 32 2664 svchost.exe Token: 33 2664 svchost.exe Token: 34 2664 svchost.exe Token: 35 2664 svchost.exe Token: SeDebugPrivilege 2664 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2664 svchost.exe 2664 svchost.exe 2664 svchost.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2336 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 31 PID 1932 wrote to memory of 2336 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 31 PID 1932 wrote to memory of 2336 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 31 PID 1932 wrote to memory of 2336 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 31 PID 2336 wrote to memory of 2844 2336 csc.exe 33 PID 2336 wrote to memory of 2844 2336 csc.exe 33 PID 2336 wrote to memory of 2844 2336 csc.exe 33 PID 2336 wrote to memory of 2844 2336 csc.exe 33 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 1932 wrote to memory of 2664 1932 JaffaCakes118_1991b20531b8eeb1f169385162661344.exe 34 PID 2664 wrote to memory of 2828 2664 svchost.exe 35 PID 2664 wrote to memory of 2828 2664 svchost.exe 35 PID 2664 wrote to memory of 2828 2664 svchost.exe 35 PID 2664 wrote to memory of 2828 2664 svchost.exe 35 PID 2664 wrote to memory of 2728 2664 svchost.exe 36 PID 2664 wrote to memory of 2728 2664 svchost.exe 36 PID 2664 wrote to memory of 2728 2664 svchost.exe 36 PID 2664 wrote to memory of 2728 2664 svchost.exe 36 PID 2664 wrote to memory of 2668 2664 svchost.exe 39 PID 2664 wrote to memory of 2668 2664 svchost.exe 39 PID 2664 wrote to memory of 2668 2664 svchost.exe 39 PID 2664 wrote to memory of 2668 2664 svchost.exe 39 PID 2664 wrote to memory of 2572 2664 svchost.exe 40 PID 2664 wrote to memory of 2572 2664 svchost.exe 40 PID 2664 wrote to memory of 2572 2664 svchost.exe 40 PID 2664 wrote to memory of 2572 2664 svchost.exe 40 PID 2828 wrote to memory of 2600 2828 cmd.exe 41 PID 2828 wrote to memory of 2600 2828 cmd.exe 41 PID 2828 wrote to memory of 2600 2828 cmd.exe 41 PID 2828 wrote to memory of 2600 2828 cmd.exe 41 PID 2728 wrote to memory of 2608 2728 cmd.exe 44 PID 2728 wrote to memory of 2608 2728 cmd.exe 44 PID 2728 wrote to memory of 2608 2728 cmd.exe 44 PID 2728 wrote to memory of 2608 2728 cmd.exe 44 PID 2572 wrote to memory of 2260 2572 cmd.exe 45 PID 2572 wrote to memory of 2260 2572 cmd.exe 45 PID 2572 wrote to memory of 2260 2572 cmd.exe 45 PID 2572 wrote to memory of 2260 2572 cmd.exe 45 PID 2668 wrote to memory of 1248 2668 cmd.exe 46 PID 2668 wrote to memory of 1248 2668 cmd.exe 46 PID 2668 wrote to memory of 1248 2668 cmd.exe 46 PID 2668 wrote to memory of 1248 2668 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1991b20531b8eeb1f169385162661344.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1991b20531b8eeb1f169385162661344.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uifaijr6.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6C7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCE6B7.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\firefox4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\firefox4.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\firefox4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\firefox4.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58c629cce1909ca541e235f14ddc25270
SHA131a22da34df01bdc852b0e1b0aa272909877550b
SHA256454b8cc1ed6ba2112d07baee76daea2baaad9bc6938614cec21826094b5c257b
SHA512e2ad9d50fd8467ec3e5a5d14286f33e60b9931dd7701d68f17cf809edd7c838fad6301ff62188642e272f47eead845c25f7ef776299aee7ece8ad93fb251ad95
-
Filesize
5KB
MD507a047b381450842f3c37b9b8f66b1f0
SHA11bce80b4fd50499267c231d72628c5d4e13f9e77
SHA2566edf5a3fff551061309bd437b7514389bcd414c2465e249c50a758dac2597f9b
SHA512b064076e0ddb9d3929e5be51511617ecc78ffde40990edddc70a4014ebb1a520cd5152c10154845c8825ca68b14f0d419e6d50c81c421401b96a52a3fa5a8d49
-
Filesize
652B
MD562503fbabee358026879a818c78dd433
SHA11b7719528f79acffdb9f8cfd9fc210b0f0c60f8d
SHA2561ab0e916c150420cc7290bb879b6cf2344a4aef7f0dc65b29cd60ba7ef0da6f4
SHA512ddfdc83d1f7d07e1d0288fef2f80b9875c8e83583b4e543921f5dd042aaf3dc5f762e28d74a497de509662d1a1417369c3e8a4fcbbdd265733787ba1e3ce9bd2
-
Filesize
4KB
MD52216d197bc442e875016eba15c07a937
SHA137528e21ea3271b85d276c6bd003e6c60c81545d
SHA2562e9e3da7bfa1334706550bb4d6269bf3e64cbbc09fa349af52eb22f32aebb4af
SHA5127d7bdc3bf83ac0a29e917ead899dcaa1b47ee2660f405fe4883ca2a2546f7924265e1d75a2ea02c0e34fac4d2bb82bbaaa88d06c240afad4e9fd49337cd04d3f
-
Filesize
206B
MD592156ca623e9cf64698d99fef16e25ba
SHA18b0c876f5190a01ef9313bbbc105a63b54e6a829
SHA256d0f50c9ebf966de640c0b25a27f2c7cc6680788c6a28cee95399a9338955e250
SHA512a2b421f91e2afa779c16d2299bd0ce4800b45385a9f923b3fdd9aa1e9ace2ea548ea7969f94bbe1d9fa51942d2d6aab5650e407015910e3b3978c24cf0ce9205
-
Filesize
148KB
MD5bc7c0320686d8b0a0c217833fd184941
SHA143786aec359b3fe728a0eafa4b1c6b0b679a636e
SHA256bae8a4085c8ac6f901695b204771938813c81b537f2283f6ce5980fc884c7180
SHA512bea534b931b2a9d51744fe829b1e97d9a04be777f1e92fba3da7c8b9a9b569f0f27defbfe75d0a2d7e89a22fd21fedf89fc5bb75cbfd6d0b89b5328d511c8e0f