Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe
-
Size
710KB
-
MD5
e03cbccf5be964de61f3ac65e841911f
-
SHA1
201c06ff12d3494d57092c4b800421b59fcdb551
-
SHA256
599dbac852823f4af45c3f05b1d3e94002b1ba34c092bcd0fd0ad7deb1dd1e99
-
SHA512
f568e1c4465d71900482fe4b487c4f8ed9078e89656ebdbee9aa4c8aa6fafb4b8f99f476848d972235f751098bd3fa4e03cbc4fedd454b87dd6810c5dc24684d
-
SSDEEP
12288:Gc//////Lze29cVYkNqKxNUi6D5M86qRPH4AL1lhsnjTO976QKnaN436gFmjgjj:Gc//////Lze8cVzEKxNl45M8PL1LT9hu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2428-4-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 behavioral1/memory/2428-7-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 behavioral1/memory/2428-8-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 behavioral1/memory/2428-9-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 behavioral1/memory/2428-13-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 behavioral1/memory/2428-16-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 behavioral1/memory/2428-12-0x0000000000400000-0x00000000004BE000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1852 set thread context of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 2428 set thread context of 2968 2428 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 29 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432480756" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74B20811-7299-11EF-98F1-4A174794FC88} = "0" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 1852 wrote to memory of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 1852 wrote to memory of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 1852 wrote to memory of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 1852 wrote to memory of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 1852 wrote to memory of 2428 1852 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 28 PID 2428 wrote to memory of 2968 2428 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 29 PID 2428 wrote to memory of 2968 2428 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 29 PID 2428 wrote to memory of 2968 2428 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 29 PID 2428 wrote to memory of 2968 2428 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 29 PID 2428 wrote to memory of 2968 2428 e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe 29 PID 2968 wrote to memory of 2136 2968 IEXPLORE.EXE 30 PID 2968 wrote to memory of 2136 2968 IEXPLORE.EXE 30 PID 2968 wrote to memory of 2136 2968 IEXPLORE.EXE 30 PID 2968 wrote to memory of 2136 2968 IEXPLORE.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e03cbccf5be964de61f3ac65e841911f_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df86875b9c23907e8c492d0562ea48e
SHA1fea34a0a5dcf773e234d6d8208a4c124f1b0bdb0
SHA256f724219f9c5e60636af0a7bbf438a9db9398d08af392db5e6c7b536093e3e464
SHA512d64092c535f0b55df8d63c5d813c7cf70561acf6c41c0ee1fbbbfaf4de82acbcf12cc15742266a9d9a691ba54bdfb12c27192f2ecfd6f2567ef879ddf287c295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56513c799fbea43409e1f18c1703970bb
SHA195819ea3ae44b67f91996a7d32134f289db82019
SHA256799646623fc4c247d66f13c3e15bfd1546b759e18642b71df707a89d01765693
SHA512a21c2f14bb5391b83d17de6b78b7c24326d62b60c0f9b9263e6ce04ff0688c32e62345ada69676e95ccf8bdf5d24a803531bb036e45507c279be639d0fbc1124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e747c4a4ab75a88a40177cc77e36b2
SHA1b88d437ce65e24325fd09926dd3409bd2375eed7
SHA256136bb4f1321964400bed7b422a505b2e1b7b242022119df97ea84415e22a560b
SHA512de004d661f30a54843ebd1f318fcb75135a0df3a872742ad1f90379501cc725fee7e4a4d12cee137dd326e169da8ce6dead50e62280bd8524ad497761377e183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc123a44fe56e25c936003bf327577de
SHA1fd89681e693fb46fb33bae36246252d3421621fa
SHA2563c1496ea8126a3554460255a235de0803bd20586f89705352566423e66836493
SHA512c3b4588f8a5fd28ee487d4453d5cb1cd111f406e8f39ee4b8b206b2c71d0d41df43b13ebd82f49e90d9f6518d68649b6be261822584637b0d70d448ab65d5bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb9fa483192fdfb536999fa5a5e046a
SHA1291465d7de46b937afdefc96f403da0829482697
SHA256bfc7be6a2f5bf08bfc5217f3a55b2d2bb0949929c71410bae62e57bd5ecd3164
SHA51212689e89d334b8c590cf80cf71c628e2b48f3e3a649c62afe3f2735c044d62654db5833d7efa0ae47f04312452c12f5127def1e784ff809d85ed2dbb72292379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57623f90bd32fccb5188672bda5d76f5b
SHA1a218501d2e5bf6f8861192710112314366a2eca5
SHA256f8198a00232d2de5a798ceb6a614dbaca8982374f655b5d597cc35771e2be85c
SHA512b17418ac654432cb2d5eebda087afb798add593ac9a29e8699e1e1de49240736e85f638fda8c71751453cfc9d4e741e9330f78f62af610460b39f56dfdc237cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e776abdc9d9b105648633d94ecc99fb5
SHA1cbec3bb78d59cfc8f57794ca8e358992b8e229ec
SHA256237dc07279fe2dbf629f549b3b14c90f7575f238b15b87a95646afc9b34e6ea0
SHA5122029c51d53219eb4fd6752bee968da301231372214164155ac309c5821f33897bdb7a02754d91a71f3a97f4a83589e6bea6952e3b22fc210a4c40aa846d6d9a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02a58f84b411e5c7bb2a1198df4636f
SHA1909f6c7b541eb90086a2fdd82a683d8a4b2d0038
SHA256a2886025e2e0c3bec756bbd5fe7d96f23167f07dd852a4d45144e87e3b5cb9e9
SHA5125e625094c889d3064800ff6e3b563602d2851a6b1d8c7bdc7cd0d6c55cf2f4ffe92e7ee856f765136ce513418f073d56a89e0c90f09b60538a2a21c4d3080369
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0d766994c209be48efcb9d36ffe736
SHA19d44773eb5c536738da68a185a3233f85e3ef84a
SHA2564e3348f754ed642b3516c8a46c3a5e481e46a2ec4d588cb53e3a8cb3ee1f686e
SHA51284f7295a5d38e6da56d715de4d317b5b599a5d88a5d4a9c235da50860426e491f38a7b6889919c17667f011aa3342146eeb2780c104b1ba5c360a365510d06d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21cc05e00f70d42cd9b2c9e7de8c1cd
SHA1d38831de44099c7860a75362763669d30020ffe8
SHA256bea05ee3d981a19c46b017d52b210c8a4fcecd30999818194a2a1636d0e8865b
SHA512d489d221a526f208aaf93dd8d7e23be2376fe119ba88f268d6fd64d7f268d55e5e9c24e368b61f261a8932b979e6801721d65184ceac989fae803039ee136720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6802371a95d3ce331dd41b86ee070f3
SHA12d239680b55e24ada4af420298f6965bf03d0903
SHA25612f90ec646701d8ca07cbbc17130bf8dffc1f8ec11c137c8b22745922310d171
SHA5126d9c751eb520c22a63577597354dc8d91278930ebffebdf8cb8b989586a81c790d5082e00bc7912538f1d3aa33c3c80377e6f86481533b3212ec0579148dfba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6266fb04016649e8090c086453d68c
SHA128d626570f2d25a1ee714a36f2e9369d8b6e809f
SHA256460d51809f06116a9f5d996d1e0fc527b17498b82720b2f60c826808c05dae30
SHA51258f779704f0ed226e6e055e3cc9c08931e2d473a23ccd8033e12ca81168408a8cc99c0df6d9be6249f2243a3696d595aadf1ec0719e9b05d5d82c8667a058f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c540fea5b2ef03f1e350fbbfc9c5ee19
SHA1c5739d2bd28136640ea39ad1322ad65e381e88ec
SHA25659b92ac528b91635e124338c9d7eb9e31555d3e7a034aba00c38bbcb1086a2c6
SHA512cdbf23cf96d533b1873f26c8484ea4bdc4636db50e55493caf599eb51e13bb6b00fcac32b4f2b2086716b4d687bde1ea6b5ddc8bf221785ff1cd14c2acae12c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a9079a78b55e1008fcfa5d6fd2aaba
SHA128b99325bd7f3db255116c9e63e8ad85522669de
SHA2566101df72504397954f250314cdfd51548490d1f189c995b90fe1e712d01133f3
SHA512a420dbf2a08b68eb3600e6aefbc4e24f07182160eeb86e56ea1199037ff6e7ab918d00e63dd4277d98982e414b9616173182218791ef4c5a42bad245f7114edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf79a3bcbab42a93e971b5ed3ada9524
SHA1754e056cee831f7e7b81520701bf4a0a61812e20
SHA256b9f5ec5d80313a99691c8aa9728654697d5d37e0427b68d6530cd6148139195c
SHA5122b763b6803716568a0b0a200ac61b08192c9d662c97a6751bf181226ebf5f5ee25fe821796bdd2591d8bab7c381e10030c16d31747da73ab5810f1cb75c68b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53602777898b3553b32327dcd7b0aaad8
SHA1d27f13e3939c19547da3016a907aeea6fea95a7c
SHA2567eab1cbde9e2c80d263d0e27781c3734d7333943389c8c8754a7ddba77cfd9d3
SHA512c345700d42b2ee9164b9819bf9ddc40460df2999b92d8ff3ed861e705778bd0ee5dca377dcca908e318707f6478eaecada243eebb06d56ba46d7a5d6bb1d63e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553449b4805fea4148d935d002ae19d79
SHA1b6457c32bf7d013fc1fdbb35a76c3625993e1b0b
SHA256d32fce9da32682ccd24ff440f1be7cb3e154c740185d147a8c3f31ffdaacb885
SHA5120f337af8a2b4d4abd44325870ae96200265fe989639dd9ad391ca24269eca8c2ad0d517151f8501aaa0f94e55af10cb9efd141cf4e4b278a77d33e33d8d5efef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9db1f5b60a6cafb3f197e6c065926b9
SHA1dbddc05c4e1682ea1e80e98ab24a8cc08f8d8003
SHA256d663833b343f8c75f25a2f0ee684ec41973e388534871b4ac18e400f58c2c2fa
SHA512f43e55a6bcaa0776dadd3d66751dca9aecee8efc27b0d892a3170a4a35e1297fc55a5f537aa4d7b2f000f4b95d22d572caa814c1f58be57a1b641696a8c7f652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f55dcb10c88469e9758161bf9ca15a
SHA1250f6cf63324cf739ee8aadda40b9c300c40dfca
SHA2566a79e2667ad71075088e868618dc0e0e06b64c3cf0d598d5dd376bc6cb9463fc
SHA512b2921ac65fad6551c84372828d01fbbdb26c869948150f0d79c2f5524812e66954ee921b755ca45966073e5c78be071076ccc8031660981c58439f9265bb6238
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b