Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe
-
Size
3.0MB
-
MD5
62c89b7d49c638c2a90186089fac7f35
-
SHA1
eaf5d3510f0e0643b093129e711e00e3044f49c9
-
SHA256
9f6288cce4bb1e115f6c787896108c8c4565a807ba4f660dcdbb1e5588c063db
-
SHA512
3ae1d2bc828e1b737567900122d3dda43d4815c3a2d4827aa3d6d46d317a014b10131e68e67cc367b9f37e96e78fe2f5d9d6a885ed1376cffff308e385655f56
-
SSDEEP
49152:bP8oDKyjpYE6z/A/dmcRdHxNWnHIvVGeFlf+xyiVXiDzG3:llFlfEyi023
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 14 IoCs
resource yara_rule behavioral2/memory/4068-11-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-7-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-18-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-92-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-96-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-100-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-103-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-106-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-110-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-116-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-119-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-130-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-133-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/4068-136-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\taskmgr.exe = "C:\\Users\\Admin\\AppData\\Roaming\\taskmgr.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Java(TM) Platform Auto Updater 2 0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3} taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3} taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe -
Executes dropped EXE 3 IoCs
pid Process 4068 taskmgr.exe 4708 epicbot_520.exe 3592 epicbot_520.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform Auto Updater 2 0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform Auto Updater 2 0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe File opened for modification C:\Windows\assembly\Desktop.ini JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 212 set thread context of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe File created C:\Windows\assembly\Desktop.ini JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe File opened for modification C:\Windows\assembly\Desktop.ini JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epicbot_520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epicbot_520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2444 reg.exe 2284 reg.exe 3744 reg.exe 2708 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4708 epicbot_520.exe 4708 epicbot_520.exe 4708 epicbot_520.exe 4708 epicbot_520.exe 3592 epicbot_520.exe 3592 epicbot_520.exe 3592 epicbot_520.exe 3592 epicbot_520.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4068 taskmgr.exe Token: SeCreateTokenPrivilege 4068 taskmgr.exe Token: SeAssignPrimaryTokenPrivilege 4068 taskmgr.exe Token: SeLockMemoryPrivilege 4068 taskmgr.exe Token: SeIncreaseQuotaPrivilege 4068 taskmgr.exe Token: SeMachineAccountPrivilege 4068 taskmgr.exe Token: SeTcbPrivilege 4068 taskmgr.exe Token: SeSecurityPrivilege 4068 taskmgr.exe Token: SeTakeOwnershipPrivilege 4068 taskmgr.exe Token: SeLoadDriverPrivilege 4068 taskmgr.exe Token: SeSystemProfilePrivilege 4068 taskmgr.exe Token: SeSystemtimePrivilege 4068 taskmgr.exe Token: SeProfSingleProcessPrivilege 4068 taskmgr.exe Token: SeIncBasePriorityPrivilege 4068 taskmgr.exe Token: SeCreatePagefilePrivilege 4068 taskmgr.exe Token: SeCreatePermanentPrivilege 4068 taskmgr.exe Token: SeBackupPrivilege 4068 taskmgr.exe Token: SeRestorePrivilege 4068 taskmgr.exe Token: SeShutdownPrivilege 4068 taskmgr.exe Token: SeDebugPrivilege 4068 taskmgr.exe Token: SeAuditPrivilege 4068 taskmgr.exe Token: SeSystemEnvironmentPrivilege 4068 taskmgr.exe Token: SeChangeNotifyPrivilege 4068 taskmgr.exe Token: SeRemoteShutdownPrivilege 4068 taskmgr.exe Token: SeUndockPrivilege 4068 taskmgr.exe Token: SeSyncAgentPrivilege 4068 taskmgr.exe Token: SeEnableDelegationPrivilege 4068 taskmgr.exe Token: SeManageVolumePrivilege 4068 taskmgr.exe Token: SeImpersonatePrivilege 4068 taskmgr.exe Token: SeCreateGlobalPrivilege 4068 taskmgr.exe Token: 31 4068 taskmgr.exe Token: 32 4068 taskmgr.exe Token: 33 4068 taskmgr.exe Token: 34 4068 taskmgr.exe Token: 35 4068 taskmgr.exe Token: SeDebugPrivilege 4068 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4068 taskmgr.exe 4068 taskmgr.exe 4068 taskmgr.exe 4068 taskmgr.exe 3592 epicbot_520.exe 3592 epicbot_520.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 212 wrote to memory of 4068 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 86 PID 4068 wrote to memory of 4632 4068 taskmgr.exe 87 PID 4068 wrote to memory of 4632 4068 taskmgr.exe 87 PID 4068 wrote to memory of 4632 4068 taskmgr.exe 87 PID 4068 wrote to memory of 4884 4068 taskmgr.exe 88 PID 4068 wrote to memory of 4884 4068 taskmgr.exe 88 PID 4068 wrote to memory of 4884 4068 taskmgr.exe 88 PID 4068 wrote to memory of 4980 4068 taskmgr.exe 89 PID 4068 wrote to memory of 4980 4068 taskmgr.exe 89 PID 4068 wrote to memory of 4980 4068 taskmgr.exe 89 PID 4068 wrote to memory of 2792 4068 taskmgr.exe 90 PID 4068 wrote to memory of 2792 4068 taskmgr.exe 90 PID 4068 wrote to memory of 2792 4068 taskmgr.exe 90 PID 4884 wrote to memory of 3744 4884 cmd.exe 95 PID 4884 wrote to memory of 3744 4884 cmd.exe 95 PID 4884 wrote to memory of 3744 4884 cmd.exe 95 PID 212 wrote to memory of 4708 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 96 PID 212 wrote to memory of 4708 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 96 PID 212 wrote to memory of 4708 212 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 96 PID 4708 wrote to memory of 3592 4708 epicbot_520.exe 97 PID 4708 wrote to memory of 3592 4708 epicbot_520.exe 97 PID 4708 wrote to memory of 3592 4708 epicbot_520.exe 97 PID 4632 wrote to memory of 2284 4632 cmd.exe 98 PID 4632 wrote to memory of 2284 4632 cmd.exe 98 PID 4632 wrote to memory of 2284 4632 cmd.exe 98 PID 4980 wrote to memory of 2444 4980 cmd.exe 99 PID 4980 wrote to memory of 2444 4980 cmd.exe 99 PID 4980 wrote to memory of 2444 4980 cmd.exe 99 PID 2792 wrote to memory of 2708 2792 cmd.exe 100 PID 2792 wrote to memory of 2708 2792 cmd.exe 100 PID 2792 wrote to memory of 2708 2792 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Roaming\taskmgr.exeC:\Users\Admin\AppData\Roaming\taskmgr.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\taskmgr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\taskmgr.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\taskmgr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\taskmgr.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2708
-
-
-
-
C:\Users\Admin\AppData\Roaming\epicbot_520.exe"C:\Users\Admin\AppData\Roaming\epicbot_520.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\epicbot_520.exe"C:\Users\Admin\AppData\Roaming\epicbot_520.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_233173470" /pproc="JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114B
MD5c819368178ce1e40fd55c813340a597a
SHA181aef3fd883c52de4fe211f3e43f70137cbccdf6
SHA2561334449583ff7823df9ba97e57bed51eaaba21eed4551e25b07794f1d48c3e31
SHA512753ce58ed7b76de63f8d68bf95949dfd772e805d0ab514f2706d72b2d504fb53e9beadaed0d34d933fee4f98d3ea13172c8b3a0e391bcab639c3d70003ec71a7
-
Filesize
798B
MD51d45a29e3511b982a1f91b33c70e964f
SHA1176a47b489be3f27dc354a2b9dd0b580bb2f3904
SHA2560a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc
SHA512c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69
-
Filesize
1.6MB
MD513c33f8dfba6dce09cba47873cf07d3c
SHA1e9e548a5d17c1290a847845eeb4a49bc53e168d8
SHA256d6b10b87890447f58063be9674be7bb0beb65294c463400ef5c88e3fa9961a65
SHA51232ee4128f79528bf3862daad7ae6d7fde724e7ef3dea673670cf263091f29172871c6381c50828a93dacc6dc321b08571cdeae7cadb433b2476c6e08f56692d3
-
Filesize
3KB
MD5cd9f104ea953a4bce8c6383639b1c946
SHA1efbfbdeb0f2e291c3a7746ef5942712e82433942
SHA256966a92ff963438f7d3fcf1f048ad716eb5308d80ac01282f1cc4e24cba98edae
SHA51205063d2b5a53bb1ad0e2505a6add805d4742affa9a02c88b434a2809253eba9012fa981fa71c5cb61a758bbc529877b6465c75b9edcaece2e00a6f69f9e0b6e7