Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
a315e13349d2ead96b8a7162b5e2b9cd_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a315e13349d2ead96b8a7162b5e2b9cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a315e13349d2ead96b8a7162b5e2b9cd_JaffaCakes118.html
-
Size
53KB
-
MD5
a315e13349d2ead96b8a7162b5e2b9cd
-
SHA1
9d8f1ad3414014e3c09bd6ba50f2fd7f6b395435
-
SHA256
49daf7a7a262710dbd46dc3d8b47ce6d0caf9de20e86f060c9150010b2e831a1
-
SHA512
68be6f6299a4ad31d36e80bc35119f0f44105da581e7028e46e01cf5cfecfc6dd8edd1019a6a7e19ed7b195ff1a71219ce3e0bbcd31b81ea1dc3fa965cff893e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYw63Nj+q5VyvR0w2AzTICbblo5/t9M/dNwIUTDmDw:CkgUiIakTqGivi+PyUfrunlYw63Nj+qP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430070348" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000009acf619495021e2627204ff00703bf949a79fc8dcfe29b6a8acdc4ba9722bf48000000000e80000000020000200000009499f2950184e070c103853046657bfcbca893d6af23238fa6b979264452f52d200000009fd5a402e279f2eeffeb1f02efd83e76f145703b80abb9a44a424c2b3fc83ec040000000a992728628b2e4c9b02794d7106fdaea6ffa3100048aab473b5fd18a90aef6807fa82b7e27909b35bd8ed7bf804260e1e70fa96a9bb3c873b6ef6d22831f327d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40befe20baf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000f7f8f447218f4482276ef131d9050eb16b1df3371ea34ad78f5fde88af0be22a000000000e8000000002000020000000b960c1d521f121dc0db0095e764853465b5f8469169df549de8c13aa4a78e6e29000000034966e168ac641df571c30ef3a25297cebe701ee69860aa22dae5209061cf7b329bfc4cc249b1e2360b28806c6d08cff20b198e1103a02a602a12d1b95462efd1675be013c0281da73c13bd1013f6aa513415af3809081f7560a277c98c4767d1e62d72aec7eff17422ed37aaae7963dab4573e13760a2216798e5c90e7ca6419716de2cdd152ef2fb38acb2cebb54b840000000a9d5d3bc7df2337286217a0c8236c2d894bf0c2ccee73e1d1d84f502ebf59d1c36b62e70419dbf0f6f39b34c51241609e2492943d94009cc2402d71e6d19bab5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{496CFE01-5CAD-11EF-9A20-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1496 iexplore.exe 1496 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2768 1496 iexplore.exe 30 PID 1496 wrote to memory of 2768 1496 iexplore.exe 30 PID 1496 wrote to memory of 2768 1496 iexplore.exe 30 PID 1496 wrote to memory of 2768 1496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a315e13349d2ead96b8a7162b5e2b9cd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ca1e47257b8dcc3a1fc1a2ad908089
SHA116bbd823c34c9ef74d7de3230f48a40b1fa3978d
SHA256d19bf39b062c44b7f42f450e2d646b8af4e0fc90f16982ff6e7637abfe370bad
SHA5123a0d0ea6e7958547de5fa30104cb09b681466c074997dd944caae32b2d3d6b9307c891c9cc1d96f40bf58a9a100d0bb7166d267652e0c9920b29057423963afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387a4274bdd1e39a0fed3dc9435d7fa4
SHA187b5c402ef7c4c8fe9b5f594238cbbc3262b5e9c
SHA2569ecc1eb972f7049e0febf560693d6a50d002504fb33e1feda1b4e2e44237bbf9
SHA512e11f277f13098e6a8637c0d52146a3cbfc10c88fc556471acac0aab5e772cfd255ac36eb541ca8e9bf4d117eb2f6fb001d37134e3021e92f071bc9a76b85a08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36b3991666548a57b34a70217556e0f
SHA1f06cdb1b2f87d63652a9659f4a4de78d571788ce
SHA256299832bae36b7ba77e2570e20e1bf244376f98840fe0ec4a6e05e0a7faf0e429
SHA5120ac1a01a09b78cf888f4901b75bf5ef8ae2a8320b7d92465dab822d0d01a774a8ad7f2dc287e46269c2aa5ed43d73b26d3969cebf4cd45708f9f7f97fbae0d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db170feb390f90334e7b894450e9d155
SHA196f465414b6e78da721e0ef6a7c1711c2584b263
SHA2567cc58c1387249373b3b6a1801323e34caa1dcf666b9bfe3d9c1561b499e1eaf8
SHA5121939ecf1ae7a20426fa063464b8d08d05060ad3f996de58fd13e5d3ddff880eedcd4d260cd20669b3ca14fe41b8d83d3e58dc7532f3a8cd1c4112a4b7850b8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ebdaee3eb1c4edc850dca2750ae27b
SHA1fd71caa48abbf5bf1a837c2241ea0528648422ab
SHA25671560feaa761b50e915b5e213c0428f7dbad25a149fc70cc50d95801574a104f
SHA512febe1e5c8af6be46540b2fa06d4e6621745b9d1e89029e886fb0a9d0aedab5ca5dbf97e7bd13173e9b04e25c77729b9d2547a0869359577fecbebe31e7cd2c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae82d04c451db0596b471646ff71a7a
SHA1366f44ada52733dc0361294c2782719d19b41d4d
SHA256e43ad039ba4e389fed3592ebf0196f08b9f2ff3ba0f79a0e8af1c45176dedbe7
SHA5120cd73035368d998563edc8d0fff12966a514a0a28f18a470eebb3bb57bcb1cc927879324d38e6472f54d669b018b50cc21b5227dcef4dd1722349c464f43b57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0b661299df51d61778d74cde140683
SHA16c331278cb5beca655052024e7023aec2b17bcf8
SHA256321762fb09997463d462b0612027cd58936ca4e156e1e0d0238c5dbfb3dc26f2
SHA512a54925cb934f29d6013de6d886a9f8e07fb7b24f20fd481ef4a155fc08a8fe3b25b52a519af62fd13cd4730ca8dc488639c587c1c08137f985e05d7dbc8cf040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfbfa016b1c563f498a87843b19fff1b
SHA17b788a714121ad19cddb62146d7e31ec6365a722
SHA2564d23e00cb27ea3a73667a881c902b1da3acb2158c135261020ea5faae2b2b4e8
SHA5127259f04e8b622b0ce11d2f5749d84756e0049b4fa290884cb2b73711819c73de6dae5cf250807f0993e706974b89f300b912ad577d65cc40edc4cf7d6367e880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56417b5abbf1c4f679fe8e20d6d577bd0
SHA1c5f3457a73954af64351ee54a0e2e6bf580afea2
SHA2566ba50e015e579bfb6571eeed5bf1425d118905c090db74596b055b181edb46f4
SHA512c0fee0c1140687d93d67a83f0c52ae6b8af3c3c5de11102c35575371372977795cb0f204c42baca9ae876aaceb8e69eba84b5f555a3e823ab18fa77c5eba3592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592803b90eec58c1f4268d23ad3564e75
SHA1738423e748f93915ef89563705403de4693f6902
SHA256c52e7c40a85bf486afa096be63d6863b500b5c2dde9e91baa7fede93a0741442
SHA512b901febc0f91e7fa4430f33a106b43d66e7c37d1c4116c755b86442bf9fb9d811a58be1518aaa3f37c1af7a89090e22e5307528f0f5cfe110b28c69d32756e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549a0faef0641ef7fdaefb64a3e72681
SHA18b60eacce57f4cad29f2cc058d6f65ed4443b245
SHA256cc9b47d8da72ef1753ca92b71b0d1900aac2d637911c493945c771f0980723ec
SHA5128bcdc792b4ad68bcca649792811e49abddaf38ed5eee3981b786228e332234a2a34adfc509ba364fd45f5dee846a1bc15bae1f512cfa90d5f746b2517f57da52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae806acd0519d0391b4a5843e49a0f0
SHA1de23bbc4268188fee7eef487c445431131c65dce
SHA256c9118650cd1396ddaf00dde43983cc51761acb0f76bab2f88d256d86f774f3cf
SHA512d7b35c207fabed9e043c61b7de03d40f3c8b9d96004d4d8b601287e1ef5373fb088b2d466675f1975efe7badd6e56aece25fd3995af37659dd8529da89772af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65bce85ded4cd81509442ca8cbc8e59
SHA1c5ec2a37dd64401d3ae568e9ae63edacc622e505
SHA256bf03ba6680af5a1309b1b0bf15410d23c59d5567382aea25ef1e19ef2cafe1d5
SHA512e8bb3f06d6f6bfc59781508c37fe3463289528749357d89a28e444af922691caa7d0d13a52cae5cf081fe6d67e9fa5f41775f06b92c70b8c0ac3754ffc055737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfde0bf2398451131b37552ff4fb7903
SHA1a20fc251fa32e384ebb53c1f359e84eaffe6abbc
SHA256b421ea9c70c451fe3cd76e54ad861ff415e94aac6a7f3bc6c6e6f91b558c6ffb
SHA5123919a970a516687923a92100528df40e1d649a99c981c15bc343f629d7d3d0d8788fa8c99a13eddb9d452c5a0a13fa4564f789584a5dff35c1ad8529fe87c62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5110382ec90d48ef2b0ac338556079298
SHA168774f1435ef6960012eb9fb51fcb5a2da346f09
SHA2565c75030d9d4951c6bf8f6b6ccf29b7923f06e5c6f589947b2bcc8b5c026db5b1
SHA512d7a5fe7b945a8b61a04b754d10bee44ee4ef13602edda5345b63fe92dca56eccdf01f2a5cfded6e106d69abc666c2ef56e407590b43c307c748e6ffcd4509c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133e7508b966a55d27fa34ba9831b3d1
SHA1b5a236b022f1d7b0864097937fdbd91d6eb88a63
SHA256ac93b41cbb4cb49d46258f001e1df2874319ddafad9b10727c50ddbda39527a2
SHA512195f83165cdd9452084a3985e4f2f9a8dff2ff2e5cab949c8378b2d7571d8bcfddbc6078926a15133c7787e5e9a4806717c18671121f924f517dfc4ec2a9c095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559afd7dbfb53652f5321b77d5c37bbcb
SHA1d1f4157846ecdd68b3d5a12719e5fbc3a131306b
SHA256c8167c80f3e11dcb7b19a8145835c017a7e06849f24b4ecd59178efeef372204
SHA512eec2ee0fed0648af1e2dfbf978800ef46043cf7835ee08076e18075621c1621703d9ed7bbfecc4da9fd7ed6ddb322152b4f88fbb2ebb8669ca3f313c731e739a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522aa6e52211e9bb1d25e22537b5421a3
SHA13772dc45cd50ca3ae8165f7f54b2d1c9ab68c476
SHA256d75c13eda9958fc1d6cd8db0f41fa117e1390813122081ec95502cdf453c70dc
SHA51200b384f75c9589f94c53662e1d08d8392fed03982ff7dcc0a5ca3fbfcd7242a7a03be4efe051144abf55485a78700f82d949910b9c40ac088e3519ffb1b9c850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50475938e9c4095ddb5444c3c0bb7873c
SHA1523f79bf7a25ee68b14d6856c2284d461ce6eb6e
SHA256f3a68f327b5676886b806f2c2996ad44f0fd338279ed41eb9891d512c7e333f4
SHA512bd063701de31919e3095be3f948e009287ee553df92bc20060b718d9537d0132c6e42b396804d43b370016ff02182346abd77f782454c01281859e6d878caa1c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b