Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2025, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe
-
Size
893KB
-
MD5
1fbfb7f9cd8500cec2e54a63e0b002a5
-
SHA1
a6ade883204656dbc58a70006b62d51c94786956
-
SHA256
0d92b4ff260d845c7579805242d3a7efd51a982d47f80eb3ab0fa02a0fdbb628
-
SHA512
e0eba341cee8b3a05499121b1b7d74e86a757dacf9b81b5c5301dc224b56f5ab4c08734d4350ec552000a2941b107c65d8d23917898cc2436bc9859779474417
-
SSDEEP
12288:fSxQpT5VIJeUDfLeE258rycxrjg+Rr6ChSLChB5OqeHzFA93LVsI4GaH1YtPqGvq:fdYKpFAEXLNyfyMDY
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 15 IoCs
resource yara_rule behavioral2/memory/4812-30-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-38-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-40-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-42-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-43-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-44-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-46-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-47-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-48-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-50-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-51-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-52-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-53-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-55-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4812-56-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\WinW.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WinW.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Yang.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Yang.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run WinW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\WinDefender = "C:\\Users\\Admin\\AppData\\Roaming\\Yang.exe" WinW.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5CCEF78E-3AA2-AD7A-722E-103FCFDD46FF} WinW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5CCEF78E-3AA2-AD7A-722E-103FCFDD46FF}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Yang.exe" WinW.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{5CCEF78E-3AA2-AD7A-722E-103FCFDD46FF} WinW.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{5CCEF78E-3AA2-AD7A-722E-103FCFDD46FF}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Yang.exe" WinW.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe -
Executes dropped EXE 2 IoCs
pid Process 4880 WinW.exe 4812 WinW.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\High Definition Audio Component = "\"C:\\Program Files (x86)\\Common Files\\WinW.exe\"" JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinDefender = "C:\\Users\\Admin\\AppData\\Roaming\\Yang.exe" WinW.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinDefender = "C:\\Users\\Admin\\AppData\\Roaming\\Yang.exe" WinW.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4880 set thread context of 4812 4880 WinW.exe 91 -
resource yara_rule behavioral2/memory/4812-22-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-28-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-30-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-38-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-40-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-42-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-43-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-44-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-46-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-47-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-48-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-50-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-51-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-52-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-53-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-55-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4812-56-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\WinW.exe JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe File opened for modification C:\Program Files (x86)\Common Files\WinW.exe JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 540 reg.exe 3276 reg.exe 4396 reg.exe 2844 reg.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 4880 WinW.exe 4880 WinW.exe 4880 WinW.exe 4880 WinW.exe 4880 WinW.exe 4880 WinW.exe 4880 WinW.exe 4880 WinW.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe Token: SeDebugPrivilege 4880 WinW.exe Token: 1 4812 WinW.exe Token: SeCreateTokenPrivilege 4812 WinW.exe Token: SeAssignPrimaryTokenPrivilege 4812 WinW.exe Token: SeLockMemoryPrivilege 4812 WinW.exe Token: SeIncreaseQuotaPrivilege 4812 WinW.exe Token: SeMachineAccountPrivilege 4812 WinW.exe Token: SeTcbPrivilege 4812 WinW.exe Token: SeSecurityPrivilege 4812 WinW.exe Token: SeTakeOwnershipPrivilege 4812 WinW.exe Token: SeLoadDriverPrivilege 4812 WinW.exe Token: SeSystemProfilePrivilege 4812 WinW.exe Token: SeSystemtimePrivilege 4812 WinW.exe Token: SeProfSingleProcessPrivilege 4812 WinW.exe Token: SeIncBasePriorityPrivilege 4812 WinW.exe Token: SeCreatePagefilePrivilege 4812 WinW.exe Token: SeCreatePermanentPrivilege 4812 WinW.exe Token: SeBackupPrivilege 4812 WinW.exe Token: SeRestorePrivilege 4812 WinW.exe Token: SeShutdownPrivilege 4812 WinW.exe Token: SeDebugPrivilege 4812 WinW.exe Token: SeAuditPrivilege 4812 WinW.exe Token: SeSystemEnvironmentPrivilege 4812 WinW.exe Token: SeChangeNotifyPrivilege 4812 WinW.exe Token: SeRemoteShutdownPrivilege 4812 WinW.exe Token: SeUndockPrivilege 4812 WinW.exe Token: SeSyncAgentPrivilege 4812 WinW.exe Token: SeEnableDelegationPrivilege 4812 WinW.exe Token: SeManageVolumePrivilege 4812 WinW.exe Token: SeImpersonatePrivilege 4812 WinW.exe Token: SeCreateGlobalPrivilege 4812 WinW.exe Token: 31 4812 WinW.exe Token: 32 4812 WinW.exe Token: 33 4812 WinW.exe Token: 34 4812 WinW.exe Token: 35 4812 WinW.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4812 WinW.exe 4812 WinW.exe 4812 WinW.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2776 wrote to memory of 4880 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 90 PID 2776 wrote to memory of 4880 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 90 PID 2776 wrote to memory of 4880 2776 JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe 90 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4880 wrote to memory of 4812 4880 WinW.exe 91 PID 4812 wrote to memory of 3904 4812 WinW.exe 92 PID 4812 wrote to memory of 3904 4812 WinW.exe 92 PID 4812 wrote to memory of 3904 4812 WinW.exe 92 PID 4812 wrote to memory of 5068 4812 WinW.exe 93 PID 4812 wrote to memory of 5068 4812 WinW.exe 93 PID 4812 wrote to memory of 5068 4812 WinW.exe 93 PID 4812 wrote to memory of 2252 4812 WinW.exe 94 PID 4812 wrote to memory of 2252 4812 WinW.exe 94 PID 4812 wrote to memory of 2252 4812 WinW.exe 94 PID 4812 wrote to memory of 1628 4812 WinW.exe 95 PID 4812 wrote to memory of 1628 4812 WinW.exe 95 PID 4812 wrote to memory of 1628 4812 WinW.exe 95 PID 3904 wrote to memory of 540 3904 cmd.exe 101 PID 1628 wrote to memory of 3276 1628 cmd.exe 100 PID 3904 wrote to memory of 540 3904 cmd.exe 101 PID 3904 wrote to memory of 540 3904 cmd.exe 101 PID 1628 wrote to memory of 3276 1628 cmd.exe 100 PID 1628 wrote to memory of 3276 1628 cmd.exe 100 PID 5068 wrote to memory of 4396 5068 cmd.exe 102 PID 5068 wrote to memory of 4396 5068 cmd.exe 102 PID 5068 wrote to memory of 4396 5068 cmd.exe 102 PID 2252 wrote to memory of 2844 2252 cmd.exe 103 PID 2252 wrote to memory of 2844 2252 cmd.exe 103 PID 2252 wrote to memory of 2844 2252 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1fbfb7f9cd8500cec2e54a63e0b002a5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Common Files\WinW.exe"C:\Program Files (x86)\Common Files\WinW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Roaming\WinW.exeC:\Users\Admin\AppData\Roaming\WinW.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinW.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinW.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinW.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinW.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Yang.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Yang.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Yang.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Yang.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3276
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD51fbfb7f9cd8500cec2e54a63e0b002a5
SHA1a6ade883204656dbc58a70006b62d51c94786956
SHA2560d92b4ff260d845c7579805242d3a7efd51a982d47f80eb3ab0fa02a0fdbb628
SHA512e0eba341cee8b3a05499121b1b7d74e86a757dacf9b81b5c5301dc224b56f5ab4c08734d4350ec552000a2941b107c65d8d23917898cc2436bc9859779474417
-
Filesize
4KB
MD5b5698c1f1e68afe42b4350e4ac31194c
SHA1be42146477ca541f18e38cf0705aaf0dc9d0d93a
SHA256566a0f1974b09dcd9fabbc4ea4ff950910bbaa78fe7b2803dbce6563c38325b4
SHA5124dc5e3056b829f215d22ba47a5e4562e590a68eeb816b1cc5dab363577e90fc0a602c24ef32955cfebc17b17c36657016cb688501ac0cc84ecafadc607dd320a