Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
81cdca09bb9c0b177f6465fbb1e2305b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81cdca09bb9c0b177f6465fbb1e2305b_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cdca09bb9c0b177f6465fbb1e2305b_JaffaCakes118.html
-
Size
53KB
-
MD5
81cdca09bb9c0b177f6465fbb1e2305b
-
SHA1
d22b13e0d31a704ed06082cefa7a96a52f9a13a5
-
SHA256
92cfcfec4627bf7ba673a5e796a46a142dd00deca357fae9c86372a5123f3eda
-
SHA512
5e2b44759af4622195466c97d2c816e80752601f850ca5b389d5d25c14a80ef04301eb7b023d7325581d45e4670559c9bcdf7fb0c8d66b4deea07a00c3666876
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlY163Nj+q5VyvR0w2AzTICbb1oq/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyUXrunlY163Nj+qn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000004056962c33e34e6459539c96216a8a565a3036279fae1980a99abdd516f96e1b000000000e8000000002000020000000ba06674f0f89852dafc6eb11328cc2c108e82d044d1262a1bd6e78a9c64a49e920000000e0ce8435b90b2ad931deefad75858d4853e62dd46bb8a3c6c80b482e26b1b18e40000000c5ed96719ba07fb52ae0cde9d69f0446acc6fbfd67407dd4bfd93ebd865fe530f3d2df8fe87eb87c47cc12fbf1b5f4cb214ca47629a64e42eeb8f3c6d298afa4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709919" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA9CB451-504D-11EF-838F-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7049c6a05ae4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2720 2736 iexplore.exe 30 PID 2736 wrote to memory of 2720 2736 iexplore.exe 30 PID 2736 wrote to memory of 2720 2736 iexplore.exe 30 PID 2736 wrote to memory of 2720 2736 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81cdca09bb9c0b177f6465fbb1e2305b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320aca6bc21b3b03646d44d9aac95c4a
SHA1d09db19cf26ebd1cb5c5218d8ad56d79b7f373ed
SHA25655e309c20af4e6bd29fa7c94e7c52f3bcfedf9b198b9941b0cbf93f2574ff8fa
SHA512770e2074894a202f1bd2d0c97306ede266bc6f7c18863ca4fa1c02842231ee849e4610a31a9b4fbed208e3451852e36d02e51385299e5a6bf10c78d156e295ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2ca7c8f0134635a25690c3b4bc2dcf9
SHA11fde298cccc59c904ecac7cb5ab18745e64d6904
SHA25664a4104d68bf25de6ae1385b7cf09a58cb860ca4a12af75abb39848449f3d977
SHA5128b348701e08e81c24e7a2c42ec78bca6193eec5be25681f4de253a99e8dfb0eae571bb05eb14a1cfaebaa83733fda490e04c1bc9e593a0f3df31c0acd6f8e192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1d8359f2247927055e78b175b9b148
SHA14868eac57848c0ff9ec852365331b52709169b52
SHA256d9e1fa71ac178b56fcccf2845a7fea841bbbb31ed64c2e630dd31170f6bce8d3
SHA512b186f14365b4a803d0ac4e2d641643b02dde111d3cd92f3f006a41ce6aa001288038c271c29a7d3014bf62a63f9d9525ea342bf805b5527b83bbff0f417f8a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467d210aa9e982f9ff3b193b3596f2ec
SHA1c7d533b8b22be00319ec19c17ede072826587f26
SHA25657afd43b77079fd7b88b098b872845fa92916fb8700b97a48557a3a10088d64b
SHA512757a34cae6930370a7baa0927cc5437528fb56e11ae8fca1606184478090b100af6539c2a002bdf15d4235871a1b81982faeb11d012be2bf1771eea1d472a22c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b24b3e83b5566770a9ba40c28c3992
SHA1900536344448b8e53987e3777d31d0058c4892c0
SHA2567a68f29a085a099cd239c57774c03e173a2bbbc950c3e3477f062069a3ab47ab
SHA51265d40bb989f289feb6eb76d06e4fbf10d296fbf530092dcf65276f0bb5e9bf0dfee1a195a54e444acb5aa990ff3c1845aa425598a4d739f11a2f5a2fb46117d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43988d8a3fda1f5fd14a49b422f1b97
SHA12218ba51de2907bc8f5807f4a57565e0c5c30a20
SHA256d4df48f612f8c312120708e42d4cdb479e572f89af3adb38734b76c1f5bbb0a9
SHA5128e3a3ff6f1bcaf8fa38c59ddbab322ea4af115543fd0cfb77e9d6a3abdb431a50ec5bd10268cb7cc4e57f2337c160c460c574c6f5fd8d6be2c39b72f170bb57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e120ab90da5b453fe78372a89ac1985
SHA1b937fbb8825a2b6e632e64cdc617409d08893131
SHA25606b7360825291b733e7da632f3e5d0ae9fe50621dcb6106fbd0f3755aeab69cc
SHA51265017b2a53370a0db2a2c077624479f4eeb9054b23b14a2ad06e79fe229636438d7f876e27368628bfb515d57f2207eb0b930765849ccad6f08cfa627423ff27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529175bfd6ba46276b8c7c09764a4571f
SHA1d51a6c872532e64f9f16c2701fe450a88195103e
SHA2562e7d87e42253338971dadb2133615acc5d7947c1efc9bb9ff4ada15601701c2a
SHA51253f960fedef78a19986cca649684f91a733fb1a357c122f7e4e336dd2a11d59f40ef3a35079a0e7eed98e0b6e8b74bddd15ec7d1b2118bc6216eca6d703e4e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec47faba7847f39b25a99cb06d8eabaf
SHA14c8c137c9437ffcbbe5a3cb3efc1826ff41d1eda
SHA25677120885b01bcabf850582eb3ac939da555c8031606414f71a91d45aa1192836
SHA5127f75fca6ed3ce8d3d1850842717500dcfd52d958be6a3163b14dc8baa98968cea0992dc99e2606bd97233d610f01bbb4865fb27b86d2ba3420cd284d6b92a9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5824a52fba1fb92b3c45a50ee9aff900e
SHA15bda01104425d4f206e19f38874a63877face64b
SHA25621d8ee53799f236be86e7c08e458d5f8b616e624181113cc02d48235cfc3261e
SHA512fb7beb8f17fc32194f6e8afbc0d0b5e4e18ad119ddb4691b5781107bb438de0fd9c240c36337e8ac04eb8d967fcea4d4989daf7c5ab0b203f9de7712af9ac9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f708ff5ca249199894c5e4ba2ab6f52
SHA199e68a9917270c71f1f206e4b2a0ed06dddb944d
SHA25616088d69e9b3c7b6bd9250ce471a9dba28b5daa126aa17225a3f58d9d99f6bb6
SHA51240a0ee23f2af0dcd1121432623b9244c245d6e79506c9dc20dea9f225b3097b2fd8123a22b24ae256a91df8f6429c63c8a971f63735e7e600d47115cbae6450b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf03d137137b6da98e7c945df787c2a
SHA16d8a3d7e56fb01cbf3ea9d3d8eef9cf2f46f2c7e
SHA256e863ffecef9810cdf837bed0010ea0911759fb1c22c9712d49f7fec84429d5ef
SHA5122146ae26e61a6c1d735c6a9cfecd1cd793089e07cb95608d6a0d76f4711055c0cb0ac6b6d1cbdca502723f8adddfd8f452a3aa6ba68bbf3eb684aa3aea9278d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cffe738632f5b30b81f2fc8c4b89e6f
SHA19d7eaa9aac87966391c53d868365ef1d8f860ec5
SHA2567569a92f343aec8cfe1a8859a214e27d7f3cdcf13eb807f3d76d769f94b61e04
SHA512b7dd21b83a703a6b55207b4546ebfd3249366d12993afcac5c315dc965c5402abe6c9e363b00396f1c4f8da8170315692888d034d0d325c2187765e56a0cc88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b3b0d037d4efd3f17aaab05325d3729
SHA1676b10c63935a089a55b874c1a362e65d822efe5
SHA256a84fcd7e7d61ad1d5be52109a49fca2fe1ca7c659d67b8b9a3269bb4db3de0b3
SHA512678aa94e4c7910c1102fa7d1e3747c5e4d34fc2e0bf44436c17407d10da3b51c90dc7042497cd3ea55e9ea2593d3a9ce6bc77fb71a505dd4acaf10480fb032d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccfd6d72f05d3b4ea1310bf1c2f9c463
SHA18c2bb5cfdb78e8a1328d9bc6bdc2e7bd2a4f7a6a
SHA2569ed89fd5b265bf6ebacf71aa5b4fe999a7b3bb069b44905427de457f947e3dcf
SHA5123e6ff6e5ad814d3843d9bfa4065097625b66344a09686c356c0637ec383c95228524564073640c7281d56d0e051c3d936c768e7bb1d3702943a043b14e19aef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b0d3e5f35a0be1700bc81eee32ec99
SHA17da3c8db2b374f3bae6733f2d06cb5d7ee38b8f7
SHA2565acbf08101070a25d266a3e3086684721f56bd43f09e39b1c630fe3732c34b02
SHA5122c96d4b03b5eac03a8737708631a1ebe5ff467b8cb6f4a793c785f65db85487058c71825b21c16013964c8cefb314f064d49f66b0c039d7e29fab6eb6198f1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5641eea25cd36fe25133aa0f9dd13d265
SHA1746e965d8707761e243628a8dcccfe692b3e726c
SHA25658e2b4462df4ac364dc8d1db8ad0413e06517ec8d5337747849fdeb240e8afa1
SHA51214ed8d52047d7421571d0b440cccd7bd42b537e63291fd85c76b1c9fdbc580ae6a1984458f7fabf83a00dd427c30322e3aa32e25a3821e3bb605c3b51043ff04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2876a0d20c2cca1f47c79ab9d89612
SHA1be8c4ba16561cffedbed571b9efa0d16bd27d749
SHA256ba07ead0150d32fa7472632532bdb5599fa093ebb7c7f0955d4418cb7bc995a4
SHA51250411dde3f26cbe07c0a81e933222a39f78fad5686e1d12b2c5a074dc17628e685da5e41a3cbc4d1fcf067b12279767854f35cabae90575da08dffd0b3e540eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557eff28881ca60cb9c8f82944822070a
SHA1e143b8ff53cbb1888e77ce90882515e4d0fa6ea5
SHA2567a0964b9f5f6f10eb022db235996577eeb0084bc3e261dcdce9b6225014776c6
SHA512abdc8e3ede9f5142f02bda3281915098ff0761d5b49cc661493da15275ad9180483282ad356fd6d554ad8eef10b99f0914ddc2fbeaf4c782830c2705771bab26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746d885fbb4acccb0c015638416b9db4
SHA19befd1b92d9c3f073d38e60d06dfee3a2d436e44
SHA256a1e2ebab6d4abe6b5fa1359d15a55573d62f648ff1ec95c70906d200eb2a4c4f
SHA51243dcddab08c8519803b455ad876da46e0e5c0ab8c6eb793cdac526838eccc4f84665c6ce80454888b848c6ce4563c8cd4c45f6191a0a06b154e32625348dbe45
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b