Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
f9a6d355072b586f8e68ec989ab8f0a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a6d355072b586f8e68ec989ab8f0a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9a6d355072b586f8e68ec989ab8f0a8_JaffaCakes118.html
-
Size
40KB
-
MD5
f9a6d355072b586f8e68ec989ab8f0a8
-
SHA1
a08d9ead307e16fa6e54a98e4eb3ad87ea578889
-
SHA256
5153f3b5f6a34dcbdd3e60b43b219009a437535bc02ac21fac6e96535d1b2fe3
-
SHA512
378a76713065a299b5f7aca7a375b88cc74eace668c51502724ae59ac29272d0e30079fc9362c27f8f2e6b9f26f55503bba3ff540c81a02cf1a6040c403284df
-
SSDEEP
192:uwjwb5nVWnQjxn5Q/xnQieUNnpnQOkEntTnnQTbnJnQmS5xMtfXncqBFnasnh90t:WQ/g2xwbndi1cez
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007cc8bc94e6c04e2469c93fbfabf86c19dbf50271bf6e3cc290fa153fb66adb4b000000000e8000000002000020000000447a268bc92787d613bc2dbd26f94325466108a4fdf8710751a5fb355942cd8390000000c0a0be32d92c3417e8027926ddb00f66c1ebe3719cf5b8181b75a70f2b83ab5a4d13aa6608c2247e998e4160a2a70b46ed479c59b533ab48d5b42119e12f93bcd39120e92f8a185d9f9ee506e7607209a5785813e30974b108aef04c61bf1e2a31c97e066f58b03dd7303ea241232f62ecf5974d7bb0f3c54606726f5e4500aa72ffc76172e1e7134fbb536c98867a1040000000fc4c5709a25aae5b783246da5796f918a626afa64095e6ca7e2545af9cef0b7db711c8330f82dcaaa7142b35b8c1cc029707fc4c6046c44541bfa6e50975a753 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005dbb149010db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000085579fca36ecb5ef5a76f51fb456dff5196ed8f77558b978da1822f705ba744c000000000e800000000200002000000032088af3798c334830a4009ca1f72bd8c613c7dcd2b273c8a12c9e4e0391b55c20000000c2812971e0a13b2cc3df46432a3c07f7206bf18c56cadd5940f1a853fb9902df40000000a7d0a6e6334f953dcb9989007566f18f8f7b775209907e3258140c32122037606351635601aec6ade28688239cc9b1d3dccd4034d3d2b6ad7e81b90babaa9e2e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433570730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F539141-7C83-11EF-8595-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1424 iexplore.exe 1424 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2740 1424 iexplore.exe 29 PID 1424 wrote to memory of 2740 1424 iexplore.exe 29 PID 1424 wrote to memory of 2740 1424 iexplore.exe 29 PID 1424 wrote to memory of 2740 1424 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9a6d355072b586f8e68ec989ab8f0a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5861897466969a4389129e105512f7
SHA1ead7bc95c4b9105e7295c6aa7e8e5c08304160df
SHA256ec54ebd5868224a7fe5f39533a0b82109f885f43f43b1836f428a59d904fbdd8
SHA512ff812689b2f13d5d4de7803288aad36a8e046c9c7b5bf8726aa270503378a97fd1ee168474d6f118332aef959f872f210d87380c4513790027d813c14bfa1196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc9b3fe1bbb660aa576ca272f6f50d90
SHA13ec86dd69676a2563aae1b467cba4642c6679dd0
SHA2568fcc0a2064a337a944147b56860a4a8a6c10c4db1b9a7c9c2cb186d4e340d9d4
SHA5129873efea30674953aa3acdb85380936da35ef0503d8811c4c86668e6f42c407edc7b1e4da51e3f858000ca16f18281c72eb7d8b44ce77707062bf16eaf3296f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a23b170c47479a5c9919e5f7250f9138
SHA136e4e39b5e727d6fe60e545bcae867e6b9b9b5dc
SHA25611561cc131526378a80fdd57c1ab4e2f639f54852cc7a64bd55ac4269aaef02e
SHA512ca32345aa60c86dacaf7a6fe99d062657dbca706fd44e7b58f760cf0a27f428f1ca16e7f70311668e86719601570c4a9f92c5c3d65bf54b70b6b18eb5a5d8fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ffb69f925b8c8cdb61c549cbc52c40
SHA197695802984204f44fff94374629fe7e20433638
SHA256879753cc56ed7db44d113b97fc8ebacc5b1e451978cc9154e84712439ce51993
SHA5125cfd9a78559bfa98ad19f9886dcbd1795ce5d449d4807695b8f9e5e78f7fde54bf218b237c5b1baa38f904f8805069e1c6191c27fc873a310e4c158e5f7c44fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f83724582dd1ce1b881def5fc850c2
SHA180c1643d655d31dcbfefd2265b8a3ab213f5b8ab
SHA2561b8d755d7f3704de03b20e078fa5427a3606a8401ff184357d7bca3584704d38
SHA5126b1353c9c6c33d4df9156a16da522dbf9cd6277b9f4ccd80ea0fd094170626548ce2fecc0d67afd8ed1745c4dff9a06f23615be72fb6f535d43a782640fb6fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926cec671eeafafc6a9a4ab038bcdd8f
SHA1aef2a3ffbab63494cda2673ca62b4ee3b7199231
SHA2569a3d8e3fe6e10a86f47645d033f3d55981d709b0eee572765b1631cb540ea4fc
SHA512ff7f7d6f48bca8d16a5a9eb8dcd79c8d8d341227b9ba92007a6078e7254be12c90636a0f6f880ea7d2f1ca14544130e0c048115a847a17756e40d3a2d2ae3de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d716a91878ac0791a5d3fc34d34f655
SHA173d06de2c59a4f753ba07e71913abea2d3ce841e
SHA256a76ec6831e069fe0915edd3413e3259d751826123573d80c185a30bda1bf1c1c
SHA512f10145b86cc1c3ad8f91ea478b43748e1e8e27baae5faca643ae32ccf02899ae1f1198bc3e20b8754e61cdde89966f19a359cf271c4ef5e294de1330f4e08f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5322b41a9a7a4926ef389524788f04f79
SHA128a284ec5444d800208e05d8a42246dfe5b6e655
SHA25645b515aa3fcfdca42143c2068536c546a8eb85d6e2aaf3fe942376cb6625ffd9
SHA51210d062d8f77db92bdbcb962fe1e122faf3e2858ca536e734253cb3e1b6d26f38315bf89180605387858c1abd8836c5232de42b6d1d1f97ae4f58ff84b9d25a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c01a45feb8fa3ebe309e5a579d32a9c
SHA15608408a658291b83765f84a3ef313a935ef96e0
SHA256017a5405c3fdf25c837c42628a5713b47d5c1d84a2cb0c5d034e2ae40b7f1a87
SHA5124b1e956dd7fc3d1b352fc8463b44d4f501db7919383cd75fa37fa7190f0da2818cb03bd299e75765d09382904b594d7ded4dab8557fcad94b640469947aa08aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537438de56e2fdf6a84ac3c3b020210d5
SHA130216277ab94610ef3f14d5efb38efb55e7e1087
SHA2563aef6aa2a9a761a5e667be760bb83ad2002f9254edafa4a214dc499c424070a8
SHA51237a6d730ef0aa64e2b175859076b7265a61944ec07402954fbd133ec3fc67201816b5a8f0b84c36b4984efe5dcf58f1aa5627818a43aee0181089237c1850b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a99e3065d3141fc16b577335da832c1
SHA159da9e238d26024491fd13bd94188760611f6ac4
SHA256ce60473ad90c76f51d45bb40844a7eaec4c51c78d07dfa4bcf305a0cd6fdecd7
SHA5128c55246f50c12c71eb510b647eff589252755ed8f694df86ce80d7578e5f53cfadf65a3735e5fd17423a1c2bf05d6652a313f787c73497692fabee91135b14ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f855a2a25825bf301891c124f4a4aa3
SHA12378d2c6d1794c134c8cfad1c6fdd6450b96ceb8
SHA2561f4d5e5fc2bb84b4de2e33399eaedd2296ce8fde3338a412b611f977b2152816
SHA51240ef4b8c83b64cecbeaaa21bd0a100f7df70151008fd50b1e7ca318c4d4183b1f8e0176ca9c07e2bef74ed8ae316e8b8d6b18f3001470f96aa2126d08df41f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5098dd4b6995103fa02ff7ef61679a
SHA178ba4e9fde6f2d2ea4aba074bb5f1a2988783b93
SHA2562a5c5ef95a7e866d5a0da30c5ed27c909ed1780730284d526ced179c6a842794
SHA512d8561703d8005e3e3cbc1108806b20c2aec302088cc9007945473c8247792130fb1fc4438a9e8fe0a2a6569f9374615246c0bf6bb47f625ff818a5876f53d515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfa24fa1dd46f3d04ba7db23ab6b8f2
SHA195bb00eb7ea764a7ff78de20bb1be9fc3f85b8a7
SHA256c7194aa9f009ae3a4e691b8a10f602f9d9ff5901ea9cae7091836d853f9d0c9b
SHA512c69f27f4bee20ec588c4b20bebeff568e001fb7a278429ce0cd635552b12adf8eb58cf44bf2ececde3ad4a119c7a45edc568fa5b64a3beaa7669d88fecdadeb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7994fa3a332474b1943c3843c7a8a61
SHA142019c70f679a7ba674e68000aae19d0b7bce623
SHA256ad2af95dfa3981de46d7267d70d2caefc0c833811266ee828053b29a11134c72
SHA512f2bb7fe79d33f8c91ec7ea2e4ed6656754315dee3019b156e748b36d6008f198713dd7f77132d1e383cbba91449794230a03d23383328430cb0be6324157790e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57a4069a6c9ef2d430aae2b1447238b
SHA1677e0f487b1c7c70c30254aa3261611553e6dc49
SHA256ea05b1806765bf7b62f8ee776ddf037a6e52e533897c31a71f3bac9290a176d0
SHA5125e918cf217279c7cb5fd52bd15dd0c1be51c83ec30615874dfd066aa96b24c64fbe7d2e5d72ca2b93dcdf6acd407bfd6f227ca5fad63c8b54e35726092cf03c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3177e728749b4c05e618ed6657ff415
SHA1bb2feb9ccb595069f62687c40c4be6c7f1d1bb29
SHA2564d62ab77b4d436d3e01346c79662d2b1e392c99e80fa04fa31942df5a3af77e0
SHA512acfde10c29854a0b2940a5866624b052d6ebe6e6efcca25eda734ad80fcfdd3c77944db3626ddec1fcb43e4b899bd5eddf9a69faf989dce8ebe338bce7d7138a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d08712ac3345c9fe0ccbbcd851602943
SHA15a3096abe75389eebd9299da7deeee5bbe7ec5d2
SHA256e8e2b0a80d22d01a3f809c62a747bb8d0b1118fd370416f6ab8e8a1e124a853c
SHA51246920a6425ac4ddac416c8e98c9483d43c7ad9fba893df07227b24475266ab129fd0b7e1832476f9702bfa0936449f34ab7e08c0ba804de70a5ace870d161d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58997503d381cbaa144c0ef6448193a6a
SHA1f67a99ff468c766c18993a03b090e0d944454197
SHA2563460177b504449d7d5991e85bf3d3d1aab267da2fff29af1396a0ac619cbb2b4
SHA51257ab7dba4d4408fcbaa4bbf424b151d617e3bdeb7e85ca79bd89ba096d3624031202c00b7a90bc3527e9117261d7bcac02f7d1f9ece5c95b708156c51760c76d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b