Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
699afa6cbfc80d06c7d540f8546e14f9
-
SHA1
dee3b07c18fc40289b54c712d7440cac3f20460f
-
SHA256
685640fb786620ccdab35a597df47e76b49f6b5841bb331279bf130608744df9
-
SHA512
342e174c5e2c00ce0dd8c18da4909ea9d89dd3df9abdd56f085ebcafd74883a6c323fbc46b1b7e0e87e540b5441362c7aa5d1e0fd34a60bbd1b79081c09031e9
-
SSDEEP
24576:MejDKKiDkY2+AhEcy1BirYZqXMrDjUm84QeP3CqkkkkkkkE:MeUDeyLZqcn3Cq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0A89FA1-4955-11EF-BDF0-66D8C57E4E43} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 209cc26462ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000007ee01b57298e72e59fe5b1aab9a372c8698bd9010afeefaf64e3b36b893dd8d4000000000e800000000200002000000051d04213c8ba88dda776307a624d6ae5201e187de1c2d6bd7420c0f08b1cf77c900000004a806e47cf31217547de7be16c639a0124696288a28d86e00e6ccd8166a2151de803360c7a908a7d743d18672ad89d320131405a676b6a49d41d88cb16d0e822463c00b1a79583a2d0c438d10acad0423ad47f81614ab2da60d0fb4e3d8de871983971651e12a49d8739fa0b2071a896dcb17d71270111b6b917dce3349bb676e932c1a89d785dade99a4bc39bde6d924000000068ce759b2ecd05e7849c8a69b10e42a371b7d15291a7e99a8f1ebb3cb1ceee809d00a7633b572fa86074fa8b16ab5c388e7ce5a5bd6a8d5ed2f5664f64d6bf77 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427943626" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000ce8b004170766cd5e5a727136573da5a0ee5a618549878b49f1d9e591dad5ea6000000000e80000000020000200000005dee8dc8f436c1b3f88a3ad3bf5c1a1512fd7f5f1eb48e4d2e7c53ebad73543f20000000e77d72d2cf4b2991dd5e6664eedaaffca4e560e5d86c38f1192317dda1da7fb0400000001d5a08302620384f45c4f98b917995cce0a03a0497484ec010f7ed91da18368a3e804c98e2ac86bfd4f292b1a44eb3bac7796d59a44dc2809a4f09e874c5e5a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2728 iexplore.exe 2728 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2728 2788 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2728 2788 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2728 2788 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe 30 PID 2788 wrote to memory of 2728 2788 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2240 2728 iexplore.exe 31 PID 2728 wrote to memory of 2240 2728 iexplore.exe 31 PID 2728 wrote to memory of 2240 2728 iexplore.exe 31 PID 2728 wrote to memory of 2240 2728 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://contrev.net/redir443.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6013a9e7656b0d3255de4fb6035b0bf
SHA15b673f9218a3c45f0a3b55c6e42e8672c0c19345
SHA256a7782ad50148ff3ce3f7f5b3dd1ee2a3b7f8a39194d72abe0f7303f5386a600a
SHA512d4e58a0257bd73bfe2ac85b31c0b4754d60304855d56e85248209caa2df394cada508e9982caa3b420eedda0d3d60fae37c1f7d2e494b3799c0ecbe32e2ee258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f122d1f453fec0db5c0a431e1097e40
SHA16551094468a5d724204c39921b863a6565b25bdb
SHA2564b919dd7752228ba78826bfcfbb1ae6f7b4f0aca5111640525c770456fb939bb
SHA512eb7cf5ba851f8021dfd6aa72f122963e02dccf501623d0c39241ce0275c37987c3aec7006d278e54febc3bdee1bc1adef2191504adc2147881bcf32bde7419d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c58d0ef429482b3fcad3c59f97995ad
SHA1bf22c157c588916d637cb82759c9a783bbef7f06
SHA25624b460444f2857ba79301cad4f8bd7a2c75f08db239768ebdc39159866dad10b
SHA5122a3d28c0ff09402dfa0e9c2377f33f7e5bd9c38658569695bbb00008537b95033c05270713ed01a5234006384722a05ba32f60a34129968f99a8ecc72bc096fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506610a4a6c422dbf2554e20870184ad7
SHA17ac3c7ade85c69fe8eb6553328be7aa694133981
SHA25675d91a0d1bf6f5b0ece8a87f57a4ebe78384a1df0d5945acd939348194cd03b6
SHA512af00c959be1ab5463dd67cefd902efe862c314be666a6166b4389bd831a12407ebe3d8270d8397f09c95318106d470bf79ec398313c9f2fba727789fa88f63e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ee57673e5d313942be3397dd7d24b0
SHA1b3b8182d8c9838b642e12e889bfed7e81c6d4e7e
SHA256406bef0e515e8bd184ddd1f713cb433ddad7a277098d5ee53c8a5f1e66631a6e
SHA51242a0b9039ff6fe97a3f7a6fad7b55d99ff513df1e20e0a1b25fdb6f10fd3dcfd4b649fb84c98e1b78c08f3510c5d1d6cf03da5a6d85e29f55380a5a56a74cb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5317b8d654c986e0438f7113b79952b
SHA195f41b0cd4d5cc37a690ee7cdc0d7e813ab37e03
SHA2561570cf6bc36cf219e5b99d206a208a23161af7d9054e6a9d27d8de399e248b8f
SHA51249767534cd1af3455ef8e863fdde5fa2afda23ae4fc4cab6b7cbff3da34e61fdf774441eaed8d9de407ea3061817f92beb4177dd44ccb7d1cf0110ec1bb80553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54921fd813394edcee75a1c65bf9ea2ad
SHA157599ce530172150263758c05f104eb27654cd4c
SHA256c0ad7bdff6fb9f58d9c053e181c4824f038103459bf6ff718e134ab228402eeb
SHA5122c9432fa323a2ee5c83badd3c755306109fc98f05eb23554a57c82f1db404972d32b6172c50fd77c74c69deb1a8c9fd36f6631b48dad6d93aeba6b62325dc500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a09af667f27b7722cbcbd8d37cae262
SHA1c8b02a0d834752645a73ef6cabb3bde7f25b5c96
SHA256b7868ac9fcc0df55a6d9ccf0c7656c6d3ab5332c617933bff08e8cad6d0af801
SHA5123c3e78a1255b0223ec1c108df041e60a1ade80a8cf8b2ab668ce2a6503afd40b898f75ebac2e0ab309890d32f8ab3e058cb6946e1e0a44c4fad9ee770b604996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5717b15f2f79be5bc02f5a0028d4735bd
SHA1c577129fe5aa322735ee97e4742458bd2ae02494
SHA256d1d6fb4726460762735b62a9c749f1ab2755d8581f4dfdf339b84fd6978cd92a
SHA512a853053464079ea884001a6b5a4973843a72dac561b8f5082182d3e2f42b2106ceed061831082f67b11cbb8cd8d4a8a08d1ef494c42185bd8cb7e7637819a7b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5323d197a3ad9ca87b01130b1beb14887
SHA1678440246b5a28ee97f89bc1b2474a80e669b2bd
SHA2563c83d77c030ea7879195105dec126e5131535244c266d5fdf6ac691d2caad5eb
SHA5124ad0ec98b55211f893699b371554def641aee393cc01750831059541ae88782d5f5c09a194de98ff3d2e63f4bd912263250864bfbd0548473b2b5fcc87d5b971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a37df1db003cb321c7f0c835ad0eb3
SHA1006d2887668c7e2ab1d10cfa75d94aaa88df181f
SHA2561710605123c2f460df3e63ad6c5d78b8fbaaf768909781c404f505806afd3a2c
SHA512dfd40d02883e25e8c63cc7e47bc4647e11d31dd1b5944a23dc91d9ba1cfae759d8a40735213582128e9d3ef197a9e0e41911932bca9fe2b425d83215b77f0cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590bb9e1c25ede53bc9bee0e6457a029e
SHA1175f7eb16344d2c1a2fcd9087c333f7ab0607ae9
SHA25657f0d85dbab85f089c18c2fe37dcde8952c74b57af99d7373f3f680b09051b75
SHA512a0d90626fd6c94469704307c6c882ea95cc98dd2d87671d3d4dc02373a2ea690b6fc2fda74ff1c48ad96cbf325ab842ecb4acebb04ede45dfbccd78aaf6af6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf08a02823c2a99ab0d9ce47c57bf4a
SHA1fd9c7dec9a8feddafdcebd6ba5668e0e244d30cf
SHA25676ab6297f1f9bf5d319b3bf0ad629dfd85555c1a2116cb41d7670d946ef5f4ec
SHA5129ae2d6099804248e6f18c54f0ea6a5bb29462f999b9fccc8dd4b7ac791f7244e08dd6e532664521df4d331c6da67b64184257397586d5056829052b2bed22ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2455e173218d4de43cbe9a3b187bea0
SHA1284f3325f60dbf2532e899466c0bbf112a180641
SHA256141dd0b59801bad3f4ba3ae8d14f7bb9f4848b0600fcc633efc5bc078e640613
SHA5129fcc5dcd91e3746965dad8ec8f8504a36d448412cf1db79aa90dac823fc3f0c900fcc598115e910d33f7324c450461941377d23841bc7459ae9c5d324f4bd5c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ad907f8d2d67448d6ef27dc4228d59
SHA13461b2cf830e8d946af2779c6a86eda6323e5a2b
SHA2563f40cad99b3b44af39a860f9c323f0dafeec6a7b6383f44ecd824edd753864a6
SHA512222986fe4863b922842583d763152b81250eb3f6ad7f01fc101d0f8fb7db141e4ad1a7f0d866b55ff172c1803ba64b5cc6c6a63e243eb8279785432a2de94999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a716fff17dabb5a26ac93919811ac1
SHA12a524ef8400ae8614eec160f9c28a8bf4c946bb1
SHA256480cbbd701f90d575eb4d1fa86feda39b3e14156167929a8e963f67d5602e409
SHA512aeceb29bca823cc7d968d950cd7ef9f0b5eb9fd7effa92efa5471b8385ec0ac503088c2c827cbf11e57afe857261b9f75e6b213c5bda18db9dea10a3407db1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1706fde2ee1280d6af9ef2f3853cac
SHA1fcd9fdabe9562788b2c189e4cd221fec86c42c25
SHA25641949f1056894df2cb83cb2595aa3ee6ce33031ac41abd969436beee59659fae
SHA51299d90007ee81879e9e2749d2d1b44a7ba83690757d6a0efa50b3294693e576837bb7c8ac8fe96cb2f5a061843b0fce50b4ad95f0c418b87c475578c3cbd79f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538d0d9c591793d43d8e3f1a9b79e96bc
SHA172a4a6f64cc0b716f795e4dc3df2800d2013edd1
SHA2564f943b8e9ae3859562adb95fc65b20e7e2da91f9ade09d11a9c34e169f4d8d9f
SHA512c22c05753e616f71d1e27b9207d60421341f1e2d2a84ba9c0a46e26949f5fc8a810ee5dcda7c7e99f6a4ba0b5d42c4a5ef1c47b082c5f9119a373d0bed40c428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50616a2c2947a73e30aa8acab80d2ce4e
SHA1d7a6c6fa96b25122d83ed22a6f4ad5dee62594b9
SHA25659550b6e8cc745d9513f400487a21c4fd6e1de624f4c89713d7d76c65ba1dc89
SHA51244998850ac237211d809e9e56b15dcd0d9cc8a48f769667083182ca3d6cc0119608d838de54215516de6e38b765287febd4493e827e1f025235eb2f22418c1e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b