Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
8575b284d31130168c565f1a7c4e58a0
-
SHA1
fbbbeb0ca1d6135bcff9ba1d8af9f2f361c9b432
-
SHA256
4e1e73f350d76157501255e9866e5b50bfeccaf7221da1595c28362da8c41de6
-
SHA512
a71270e42eb90ccf74a056d8f1656dad9f2be987929928510e952ec59fe0adaffa4646d885d85eff9359ac69b1cf9395c33d627cc9fc2d4cbaeb39b1cb43b34e
-
SSDEEP
24576:MejDKKiDkY2+AhEcy1BirYZqXMrDjUm84QeP3Cqkkkkkkkf:MeUDeyLZqcn3Ch
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429441290" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000003705d50471ff61789fd2d28c353a8482c9482f8e634687e9552f49e21517ea95000000000e8000000002000020000000bf000d92bc34b99f4107cc945432f80f343697b16169925b18612c4138db737520000000afde643ba74056416a2cbdd7c9927afa079b7a2b38b62cafa8cba2df443f1f8e400000008c8c972a59419049b5eb75f644f2b1f2f27d985e114c6e4a6496aeebd3869581693c382443e6ddf546fa99fe25192e9df16786e047b4ffe8f6234bbf197e8930 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708d1e6b01ebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5BBFBC1-56F4-11EF-AA78-6205450442D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000933478c295469569afdcaa3f6a19588cd741772a4887297a4f4ffaf9992570ae000000000e80000000020000200000006070b57f818945d51b2510e1a78fa6a054eedfec7f1da89ff01e6357c3af0c2b90000000c42d8ddcafc94b2c99744033029efa941111eba3f535011b0d5aa327607ffd09b49e670a295333ae769c1bdd3496aaa2d7b2234782f59119b3b8cefdf407516b8ae7d1de4a178a3861df9c5aed778c8a59d565047fa911a16fb01d23ecbef70a00380439f08f7066527a60c148d0d30c60f752b3d1ccffccb729fd681cd99c3d7cc9e8df319466728e7660da0a88a69d40000000693be3be48a51ae6d163cf2ecf112bc21841d29e0d971abcf4696ec5a09d2c8a7477323afadc92fda8b7a05a7a2beea3d669cd04eaa1037ca8297838a301ada0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1512 2968 8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe 30 PID 2968 wrote to memory of 1512 2968 8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe 30 PID 2968 wrote to memory of 1512 2968 8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe 30 PID 2968 wrote to memory of 1512 2968 8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe 30 PID 1512 wrote to memory of 2560 1512 iexplore.exe 31 PID 1512 wrote to memory of 2560 1512 iexplore.exe 31 PID 1512 wrote to memory of 2560 1512 iexplore.exe 31 PID 1512 wrote to memory of 2560 1512 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8575b284d31130168c565f1a7c4e58a0_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://contrev.net/redir348.html2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef3dbf45a7b2b6ae838903e85b237993
SHA10495aaac56d194325ff224869a22abadb9002c31
SHA25633357748194c3f26211806ea349692642a41d6cb5f03fe7b91696d7b436591a0
SHA512fa9ef4324a6b7570051ae1ad5344ce3111c5f4e7d4a83087db3ab0bac1f8cdeed89e25bbc0d2d17eaced2aea9412308ca50362ef47d08a4ca094f8ece4558a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a782cb47c94e369d704e9ef06ce7651
SHA1f9854e15825a8cf283719571d2a7251a5592ce36
SHA256555b4c5aa0e561aea594e52f0ba0873c840f2148a40e63fc1bf33c6119f93130
SHA512d533bc94c130e34eb5d358f9da89cdbe0de78c5ac1f336532dfec325e4b53c99a8b58fb26b4534c3952dd3cdfd0c0ff0b0d785ccf02c1dce316f2c34ee951224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7175160904ca33c1bdfdd4af095952
SHA1f185115db757b277d01622cc1697c7fe0411650f
SHA256223440cbf4a2228359fe7211ff8a7fb117e1212172a4f0e2f3a5de8c2d040a92
SHA512679fdc805e5a361f42d30c866f6ceaa68bf1c46206775f599c23b943252e013b8713d24516dbc25c4a6070770c974951ef3622e467c48bdf5051a82b10a911ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8124b01a21a0156ee3fbd0cf6621953
SHA1bc1a7a474d135c9761534bfe7a11b7d539e6715b
SHA256a0f5d304d4424bb6d1859cb1a3bdba185cacdf4197f40b8ab701e27e75f27000
SHA512c0943fbd697015a5539f52f5956cd417e79b6078898c8b0885a867862adb80d90458ded48e7d80ee9657fe83332eb6dd4a0797e100b287feb5616130d00ecda3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a444aa62e9e18cfb9bf2924894ffa39e
SHA1d8832afd82588738d4588a4d53e3909e507298e7
SHA256e8e0ee59a6d54160d05b6434fd497aaacc56d0bd2e65deeb50cfa5f2ac7f6ceb
SHA512d690d36287e808ae2308eee03c73a3754afe41e4d7ac4b745bc13004e04e544065001646dddff092664e858f952496b820e04bb1fa7ca3e894d39e3a87198bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f75f30633e3ed86496acd8bd9861a683
SHA17bf351f45c2d9c21ca99314020408698cbf0db28
SHA2561b36ba2d35e2b8bf770c29e1a07461d30e38956422d2fd0377b3bd3a4cc45190
SHA512932af4e6eec29105170b6ac6a9d2ee86a788802014b7b4183f225e451beac3261c562375102bbe57e26f859f72cc156b9b62cea16f08f238815a760308b7d1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e483badb336fdd40ff3298a25bd37ee7
SHA1ca9c903d81861627693513e76f5e2fe492b8cf86
SHA256b1a6410d5a19285636f262c1bc17bafe01c32fa4d9c8a9c5e3b41ebd9cdb2af7
SHA51216274534ec7406011033cf99d955c0f3d0da206d240d130ac9ada3b0415321f7b879b6b9ac326bf1a6010cac9d7d2ecb7977d74cdbbe9c74c2a06c1bc588a803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53141fcdfe3a540bbcc20e86a9722ce26
SHA16874e36952ed4109fb6cb8e96c11bad86e5f80ff
SHA2565ca7fe14aedb5b83a597f0aba9e81225a90db66fb9070b30e72e02a13c4e6e8f
SHA51255817f1718098b4f49951eed267a5ff7beccd9c1ee487e79d3883ea96c9475c4efbb170adc03045d11c5204bbbf131d5110942d0b8046a119461b1c30069cbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564754e3ca71744b64d7eb240a6125f67
SHA1abf1e1715416bd7bb7f492e2e4511b9d0c3bfa67
SHA256231019d89d44b7ee9912e554e523977359f3596a660f710df47289a692156c18
SHA5122b0510c0f8d5a7d9c80b390988aebc32a3a50471bb253a91f142978a82d56d2b82ab9dd0b17cb4cc8fb902f622d4117c52e642b70662452a29a014cc2365e532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d70d166eb6dd714cd501de2d100c115
SHA1a539d06c95150cf386dd0bf7c77fa4bb7963db6a
SHA2563e5031f7c72b95e17c768e62642d60a75ea7664f731af2f9008a664cc4f9988b
SHA512e047afb551f15c2a53addfd38ee8bb3eb930ab261a3e2fe19858db5d1a520f83fc015a4c454cdc58b112389bc1cac3a3d8b8b22dbcadb8905c4dcacc63771e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261319bdfb8e0e32fecff3c67040ec03
SHA163e49e988c2629f03633c95bd4f3bc58ef95cdbf
SHA2568ed12cdc9ce599067a1d5253f0fee074128af65cff4d7a646a8096397c00a3d7
SHA512fd03fdfab291e68a3eaea6be35561aa6cb7cd09f7a20adf68cc9318bb88e79201041b6a110368ffe1931f3fb1a9cb5321f8dfa1d8eba50e13bf30b721a0ae39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a7603b6860271152d5b554a5607a5a
SHA159e3359a04cd5baaf7340899aa9d31f0550b53b0
SHA256b05ea95ce22044adc3efa8fd72a759f5bf27a45dd00faa62215a4165bfe0ae54
SHA51261951e70ebe974cc8b5d9741eb68bec476c35333a2cda73180a5565fcae95ff69f8ed0edda41dd026159142af7e1e50dc89892d57c64ae04ea579855501bfcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa644d8f4f85f684195d05f75d2738fb
SHA1324f032ad53f5f7500a1a8703d0f7a93324d7ba1
SHA2564d3eae6e3a78a07a207f40952287a8c6db37b262cef9792a39560f47789d686d
SHA512a5d6be9a187dd0bf119d0c5e8d91cd300630591857cbac6547babf09d0926640d4639d3ce78a696b7c3f543c53e6735797bc5845dcbd6a532f58ffedca37dc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5396ecac7df5fe8e4600629dd5442f157
SHA11c6ccbcd6413ee51bcae26a2dbe329d21e4367ed
SHA256d30e071265a81cdc2a25bec5680b82f89894abbf4749628c699980d367c961b0
SHA51221d7efc6d27792d9bfca1063d1fda1fbfd3cdc303302048a563ea5b49c5b1da3ce9c843c81f3579e1ad6b8dc238cac6b63c9877e58c311f4eb93c938319d866a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d303dc2d86d83ecd4643f26756a2fd
SHA19ac325fb68449f4ded6a842b2e48d43bd9822ee1
SHA256e810e0184b3e3a56dbc235b68d061036aa92c79203828eb14f04f6da7f9151ab
SHA512f4e1552739525d83820c1d0eaed95264483b3256cb45c25d79d1b968c40b63ea8f220d8b2b71835c83d99746fe40a4078d43796995a77d135825f24b43f9add0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e890592a077995910127dfa85dc1199
SHA13cc18abdb9871cf3b2a8091f900556aa9f89fe8c
SHA2565b61d2b8eea18082ca6658b56107a5da8094c300151555475422ef09a8a42987
SHA51290483d06e5909dc428ac34127158b6e0dc022039e5cf4eb0ed95e7cb49f6c866dd369ad4487905f0b8059273d0f97ccf60c42ead691d7645321486a1abf45634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5078abce248d26ad74539b59b75365475
SHA133c75c58d404cd18aeaba886675469a79f04379e
SHA256c9d6b0cacf32d7222ccfd517b7ebf656b8c6a09a4a6116b25bd3f6d1bf99de25
SHA512c979b2be4669104239415a9e7c32b701f59ba330af2df91016c9b31a3f3e3b622b096897a03f011ac366e923e748b3a26132cf64419cd347f9b7780367230302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ff348ae665b6ab5bb022cb2bac0d27
SHA1e2c5de033bb285d2b0b6211696e3dc97c3ce1ec6
SHA256add48cbe02d77f4489bce7dd6fece4ca9a0dfa1f86dbd533d3c4d4c7de46a1be
SHA512841f65361595ac51a9e94aded10aa0bae37a17dbe5a236484c62da3a474260709c707f3bd708337defc07e1908c6f75d0624ac291b99b5e7e487ffdaf212f60d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca80350b0dc5f614e6a5e32e746ab05
SHA188003780c93ec806b2920d2d1951cbf9caf7a088
SHA2565c91c4eb186f4dba52e110d0b0eebf194aedd24e42f69231609b240580317a17
SHA512c90c79fc5aed68f7d46a7e46a402438b814506b3d6f0f0ecac6142195ecc085ca037a1f75106286dc1217f9dcdfa67960bc010c805dcfb59b30e3c6d5550a79a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b