Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 12:04
Behavioral task
behavioral1
Sample
a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe
-
Size
30KB
-
MD5
a6b5c150699d1dab774cbc9839476e28
-
SHA1
78d12161adbd52f02dbdc2ab040a88aa516d8cdb
-
SHA256
0720d78a5ec3ed327a96e0162e31c2f3c3cae5b2fd7f33caa2eaedc41676a247
-
SHA512
2f62dfe4262c6bd9720b96d4253793d0bfeca9326dd84a2f69156585f75e70e27340bbad1a584c945e5378e45b918b3f0f96b15e0d07ea1715308742410772f4
-
SSDEEP
768:pTYSVHSNWgLqRwk9e9Gj9KjvRWPiKXags0b0:pjHS1qRX9mvWZD
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2852-0-0x0000000000010000-0x000000000002A000-memory.dmp upx behavioral1/memory/2852-202-0x0000000000010000-0x000000000002A000-memory.dmp upx behavioral1/memory/2852-491-0x0000000000010000-0x000000000002A000-memory.dmp upx -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c0f8c666f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{031EAAE1-5D5A-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DOMStorage\adult.oo.lv\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000000a1970f1881ec8dc9ed99acfc2c49e6dcfd935bb925c4556205726d99dfb500000000000e8000000002000020000000a9c62933ec9b73432d55288281e9e3a43842afc5d949ab6f0071da1a925c68f92000000073283b99896e81372be73af2ac2857a844ba2316e61e08fa60d61c2a597210f0400000002c7751fc91f0b10388b4a75d4eccdf2812487ef949c900ddd60414d6b6fafc7a840be8976a0423cb90b1ea5687048293a6f51ee83963f89d5f5f71f1c145cc14 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000952e299ef5723844d9781fc78c75690f8fb7f50a3c7e881263000412383caaf2000000000e8000000002000020000000c2670c30812953628bea6998d43cfe51ff96d6fbc5b6c7c7e10accff84abb3829000000007b3d55977c036aac0d1ae00b5000d3fb7e99dd44043914ed7058aea08870a75d390074b73fc73017efd8c2b906efc9ce3c81892010dc058f231928229e470f41aedadb429e9c66ae8157b8139eded46610880e120164d152e53163d5dd73ebf62c373ecdd411f90e6aeab72c84e0845d9bfdd4cff38b9d43b0b1ea4cc679ddb581918d3edf7f00be96edefbe3a3b31a40000000b5a0cfd18a842da275a97214549077a8df007d24c2b865c0631ee9421ce3e5c88275a11f02f058ef90b5697c3be31c7926ee7c199e7020af3787f1c13dafd349 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DOMStorage\adult.oo.lv IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430144535" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2668 iexplore.exe 2668 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2668 iexplore.exe 2668 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2308 2852 a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2308 2852 a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2308 2852 a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe 30 PID 2852 wrote to memory of 2308 2852 a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\system32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\drxsiEcqES.js" "C:\Users\Admin\AppData\Local\Temp\a6b5c150699d1dab774cbc9839476e28_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD531361e82ed07df5fbd7579c718f7fb86
SHA153d5b6313e6fcb403922fce37843ae25479f78a8
SHA256064f736a090725f838ae7902c544a0bde19664d9c709bfaa97d193968af09542
SHA512027d0592a4f1b8b050e73f5ddc3b258ff102f99e620d331fccb0d4df72b06a0de3404d8ee6ceb7e2c70e21b0dd5a596bcdf3f18e51912d2feba6433459f5b659
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51844ef6a76f67c22232f01dec40db47c
SHA1dc9b7e71e2a58a52be6aa0691c45ffde17ea8875
SHA25652258ccbe2551b590aedc1c0041b4eea1ca93480c5cbfea235716d2881e2154f
SHA512171e792c6550fd8c13bedb094f4b0ca33519035438768b14a25821e53c71166d59441849e829b2729a757b3040331a37671f1800431e9b8e51cfc3e1be37b9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d5cf8a28b4681dc204bf1dd623fc1d1
SHA1b8eee8ca567825cf28fcfc8d1209e336db677d06
SHA256765820f35eb8a825a0cbc17a1e879b947c7fc1e610c77409d7235a0225c03417
SHA512e5734dee9f9309132223138ac584fcd97c4d9d21ce2fa3cb3303f093fbd956b85cdb7a975602e1382d2d2bdbcba6056e7c312f980c0c24f59deb5a09e6f9d074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d346f8c85ccf0d4e1582bc75d888006
SHA1293b4598ab5a43195fb5a5605db0c8b629442454
SHA256331bf9fbd13d63da3ced83191dbcffd8dc85dadf17333a05938f247edb6f9307
SHA512fb568e4ca9e35360599069a1d9fa741aa2b9b003975d248aaaa5a7272b5e40ee8e82690c7e22a2c40dbbc5721a5ba3c7b99c93be51c47cd62899ae1e143c67de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5082b5cffbd33bd71e0adcbd4aebc472c
SHA1e11882c42351a1f56c68b2233740a711928658b7
SHA2564f1ea427d1356e73edcbc9667a7749d3fffca4bbf166aabd632397b34ed4e52f
SHA512285c1360105ada21efa418eb3b09c43ab9d4fd1cf187cc9496d4fd27cd7cd6e65e50d8c234747fe7809ea50fd8da7a0f54c78508bc0c7c1fc9c92fcb6753522a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f78eacb558654e8edf57c7eafbd2ff3
SHA1a34e989f2b041e22fd11273b76e74d819c43b9e8
SHA2567fa1dbe2cfd148536a5dc0a0f2ce7d95f179f606a8243d0518652edcbc5e2a88
SHA5122b074788e03b547a4f6a4201ec9287166e389cfa99c6c823a5acd3143d4fe470f60df5ca8ed3cc4736a50b1c7f3675ca45b595249b0e71f6cfbb2f2eb9285105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527349acea2540cb34d21e42bea805559
SHA1e0bbb816f37bc76e245b5ba03f5132c06096052c
SHA256829e8f0591a9e70a944a51a424199cc4fa2b7ade8a72f6653352f34543f3fe15
SHA51226dc850b1d8993f90657cfdbc6f5e660af957405b6f80e25a7784093cb337b39930fd79d8d02d8b468c5d9a0d3920f0e502ea51cb5d1200d3f48466a7190001d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535119996230434d8394a1a28bd77deb4
SHA11f9203f0af14a586aa422dd8af0290513b1a8262
SHA256e43dc0ea4b98072f6b1ee4be40e143c0a042e137755a4443e731a928648e930e
SHA5126fdbe89787fab686deb055536da0532719a0f2c2e0e35deee4a0ffc6e6a6c43ee6e584567268f62a565d40e01785cd911d8ceaea2eb8ae5c8121896ed973fc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac917161c494a2b9c7e0f4238d903639
SHA136797fa12794c89b338137309d5d904dca555607
SHA2560eff4ad6ff7ea4ca9dc829dfb0552c2bc9fbd906bda0c3fbd540e090140b3d79
SHA5124eee7b8c9cf4d9fe80fd6987a759fc96eb7a98cb91a32e8994bc67765caf6542d770ab9d13d205fa634b729976c04e4497ddfabed503317bf2aa134a6a2797b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae46837a8df66a7b21b95831abfd9a1f
SHA132fa54230f1074e021febd2d19a5e28ebed6bd30
SHA256f8b33aaaa73b264c60569eb52cb9fc22c2764a85d9fed590f8ab6d55c884849b
SHA51254a6ccba131ed859d1a61b713e2a18357adf84ed6af0f57eb4fc5c891538b67599dbaf518b3ab1c2dc68daff632e847ae35c5bcf40ceef5ebf7cf0c14f84ef5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541122450ba4717fb68e646e5852b58b1
SHA112fbf36b9d792c6a802ddc05f2925880ece9b851
SHA256439793d0b05a102bb63d822f6050b92fbbb83e27672dbdb469c2f1fb47ba7d3a
SHA51255405a1865ca587613b25bcb633a18e8512d40d825cca17fad97e50d03ba64fe57406e9383351c2a86d01a6ac118826691d2d1a5001fc1978bc7a9a1b6d2aeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD549b1bb798379a48dad14c2880460a64b
SHA11cfdebdf1dec6950cc7bd51bb0336b69f3ecf2c6
SHA25690d876f28e6c91958a6adbec253e40b46a6e6826df15d6021b820741c38ea1c6
SHA5129ed291a991955610e85ce2d37df7a30c5ca3a6df7e3f9046978215fc2d6f4ca63f2a5ea898bc16f64597e0acdb86ee31f1f40494c17b5229b84b0d349028e34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD505ae56542f504966c94bedf5a7677174
SHA17a3c7cbee5cda2028ea5ca10d8565db9dc9f60e6
SHA25641cd49af1ad8f87d9931d1e78d63eaccfb6b29b7ee43b7d3e09524592ccd4cf8
SHA512c3a4de37eca1d653e777a497c7a87bbae08786db4259a65f8ec21a270a5caeb2531c106f72ebb2c53194d1cb5d573dcccbf16fd23bfb9f679f6e3eeb5bdf8fb5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GE5J41S2\favicon[1].htm
Filesize291B
MD5b73189024a094989653a1002fb6a790b
SHA10c44f096cd1fec253c1fe2fcfcd3c58fe05c402d
SHA256014c471c07b2bc1b90cf5b46eb8eb60abe3ac278e43cd8fcc7c4e6c8950c592d
SHA5121bca726835d33847812060c968e5306535f513429de5c90d66942155fd42ff75508dba97da8ca36c6d6e6a8df5a2602fe3be047bb5612ad4e367c6c00e1e50a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
5KB
MD5c137100b2f1105d9aeb6d9c39f986c09
SHA186a2baf63b44d8b7d5ce25988e8e763a3205890f
SHA2567f0cf1a86a41a583b088ccaec4765a8ade8e71b6642e9cbf61b7d5154035b951
SHA512a6fb6778780f5c5a1a7e61d718320582bca1dace0ef91ac4af0a512d0481846dc1bb922b43a195381fe18f4aa25860a80ff172f08470c0c011c15472faa0f3c7