Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
ab8f2c20496e581b96849a93f5c238dc_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab8f2c20496e581b96849a93f5c238dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab8f2c20496e581b96849a93f5c238dc_JaffaCakes118.html
-
Size
24KB
-
MD5
ab8f2c20496e581b96849a93f5c238dc
-
SHA1
f10ca6c8c94b54fb6d41591370cd9c1e62604c13
-
SHA256
73712d7af0541bac5d0bc698e68d90d5ab4e42a64ed2ce8231cd7e5a523abec0
-
SHA512
e073bdfca88ed24863efa9dae5f3ce85122948720ce06458d2c00f3b0d3e257c006140cfe5d69b958302792aa825f4ea2b8529e44ccfd5d84e9affc0b544acb0
-
SSDEEP
768:QisaVBRdKZ/vab6hEJeZdzaLZTuK49SF8/FQ:QisaVBR8Z/vdhEJeZdza1TuK49Y8NQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6020daca4cf2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430243295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3856921-5E3F-11EF-8B52-DA486F9A72E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ca320ae7783bc05bf50dd55e05784e5232c56bce1d77956568b691d2d2806d09000000000e8000000002000020000000e351b179faf584382e1fbcd141d9cb7f7453c2ad7dc2544a30e547ac2c6d1697200000008b5db40e581b0454753718cc4b45c2db92f6a30bb64af3df54dd1eeb1e6285d0400000009a4ecfd80a53f7747a0b2c951b3166af5e0e4580ee9f641514f1a5100f4a5f277e71e11bf5d8d118a02262762abd6d002f6b0a77fc74182c30b49fb8ce4433b9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000000e6d347bfa8650261b322b1aba3693bb50a9af77a86f0f74efcc22a5e3cba497000000000e8000000002000020000000558362fe960b24df534d07ce048aa57554ec1a47ef45edcd14b4300e8271187e90000000fa28730011854035ba72aebdee8107866a054d89e63a48b4907f9105c938163831dcd8f313be42d7106eb8622a4a63e45def78303826c2072ef9ec42576bf67a7e9cab1e51b54bee5b4576a47c5dc41a5de4d67ff310c428f72ada777c975726c5ab872e02faafcb4c396f63f673166346c0233b8a715d0d01f8c99f8c28729fefe1cab311e63ad944140dff92428a8e40000000f131af67691dda36cf7ec7358f98834f1f32da1989d9c5420b0e9cbe684d24e14e16f339b19596a1ba1c60d1b22c04b09b59306cd51642303e308dd44b673e21 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1712 iexplore.exe 1712 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2036 1712 iexplore.exe 29 PID 1712 wrote to memory of 2036 1712 iexplore.exe 29 PID 1712 wrote to memory of 2036 1712 iexplore.exe 29 PID 1712 wrote to memory of 2036 1712 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab8f2c20496e581b96849a93f5c238dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e677d6123ae5b1ebdd1fbe87715f24
SHA1d5bf6c838599c1aa575223290b8a5ca758f5acb7
SHA256d492db618c44f443e54ea1ccd00ffcead04a2a54d9f0faaaee31de898097362f
SHA5123e66ea194abdf10b5537f5c57371117958ffadc8772ccd2491f931606ea2c16f37e3cf0fb3e4395efc027fbe5760d92bcbd42775fd4bdc21f3e14b41b0d1d465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555015de9f1b6341ffd41b2fa6cf40465
SHA1a61925535e6ddc95e51f87324dc4799e4e70bb53
SHA2568f65545778fcadc7d190726ff9467e70666634fdf4880cc29c8d5ae9067f2df3
SHA512644d02d425e265423da2c73f38527994fc012ca36b1d3949ca715857066382d92f284cf585ea6cd554535d69b1b148964fcf160ab79f01490d961dd3775bb4ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e1f6dd47cddb7f506c7969aa9a2841
SHA1a71b1fe7dd209601d55be8c65a3044a5ce6162a1
SHA2562d515380d7fd9f9f27eed10a41798805afd23b59b89b97077bf468c1b84262ba
SHA512c989724b893f58f48fe807ac5f62fd9e8005ba98657e87b1eec02d6c4d7f9cd3311a46bddff635a2a44869275322b754d1ba29d420f2f31e73e1b66793e1f249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ef7732d0245920d80e8bcd59b9cff7
SHA1d35c9af8fdc03964bf9ed1c68a28c3adb24b299f
SHA25687a62fc8f46cc8e7a0ab526e087bb9cd4c35a0162e15b82bd5d5d618e6c76b6b
SHA5125e97864d56918539a670fed9229821383da04433af9f0b52cacf6b8f1befa2ca2cc46bf931ef94ef88a2a9d9c2c3cc708060d8c14c83b82d33c0fa1c544fcbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670c7280f2f617999df0ee449b1edb7f
SHA1e0767f5ee1bbda1bb19fb0167c0000d1136ca2f1
SHA256c0b9fb0ca899d9b09db7eae11be39179002f57e035c6ebae3c994a937bf7c498
SHA5129274d60440d365ed25be42b91441b5e7ec4ddb8502e416e7e6cee02c551f4676488cbdc3483580b68dc3339dce6bf591201d701272f4ae4b25014270acb5b19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698faeca607c7cb3317fc89d27a13e17
SHA189b8cf8ff13ac9632338386ada25ac406fe10a4b
SHA256a46bebea5ca6a0878cee2565ed60275893ba57e847447d75e0bf04598bd11ed6
SHA512e9fda07c28b0684b24adab60ea0a0cae94a1c00399ea9b63d777187ee62b2543ecf54d43632b193ec0fb198306ede9d4e80e1b479216cdc53ba8d0669bdd1f22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5aeb955f0895088387de1734546279
SHA1bbcbd8469fb60ba46a89103ef04cf5e8f5e9a12f
SHA256afa886e1640c2f1c3392a32d1f3fac7305aa0db956021b8fb53b26baf3b21c7e
SHA512cdfe1f20b0645b2e683b70725a7b64cae813e80672b2b732c2a0b417e67eb06e16d6b965053154cdc826b05d7195b05026da4d8729e23da71d7d9a05aa12b980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557a4f153e3352863b5c66098a98b01a
SHA1ac092b42a0b841fd36ae54a6f0bb2de66576dbbb
SHA256945b249c22f859f978fce84cc562e2d919a3bb627889261083aee82ead195633
SHA512819d8481679ee65abae48a28ad0d8a24cc5b98ab040e0f40b7df7853962bb4aabd8156e9285b664f75d9ea23132eedb82b65db19345f3b6e22f54f4b72e28459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008b0cc794373ebe33a72864a488d347
SHA135aff3734adc8b84bfd64ca2190900072add4c43
SHA256f5290b0cd5abadb89940fd39234c5275032704e48dd1d2192795feb063fccf8e
SHA512575747e14e2c6011d2a8c22f83f2b1a04912ae739d9f0280bd79059825106638ab1b34640f5cae46192fddada2deed36b7f4aa0e2e706f1f1f78c89b6182cb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578992ca5623126e7b3a5ee805a850f51
SHA1c2cec852476acebaf8931e471a04070a6277c796
SHA2569a6d55cbb650eb49bf144b19889fa31cd2434da5f30001101bf21b3d297e5b19
SHA512fc6b7e38325d6ae17d41a81a86f0facb93262b0f6cf75275b0604b1ffdd2ca07bfc2c77b671ac4c458eaf56b20a3b5cab218f5801a6cf7989b914a59ca0acaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5760c791bd8c45bd5cca3fc75f2613247
SHA18311b9d4ff38dda0a4e3ea5551ca8c83cbe2ffc6
SHA256d76f93e8d681dbe89a9ac14f632eabfcb0fc379b38a763a805e19a601a80a4cf
SHA5126075853332aed588d24ff19d310e409b6d1de072b5645534fdceee71e865a4f39919cf371fa82b3b28a7f0ee9e36b6eeba1d198d28d735e99b6554017786881b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c269aa653c18fc94c2282c5688c99a
SHA179d369d47b9255975d206a2d3b09b666752e1121
SHA2566b8630a79a508e78b5b196124906ef22fbf27fb6be149f184f7fb7432ad00b12
SHA512d7675921942307c3dadb523a26a26243f3b61ffbd2c84a28f166a5e526d6e463fc3f880e19112764cf020040e640b56371b22b655100934c63b02d7428e94d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fec73f93a970337e73adc67bcde0703
SHA1fb985b6d29706807536ac0c4700f0296a547acd8
SHA2568b55a61a167c8fb04985d8a4f3c504c4c37b25c0b6b2f6ddf03cc010797b3497
SHA512164c31446c714efc5226086c8434fd33b9b8471cc4d2a66416c4a5535a23058105b8a1cf249895882cde1e2fb6cc017b7cf2701c85ce18bd099f6ab231402792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38bc78075c00f2bd933dba030dbc012
SHA1ae6d4aa20c1fab144c9a119e5d3fd8c69b9e8415
SHA25658fda894a67876ccb7b1e91cd19433ee1f074804403659c82fa9cd648adacd5d
SHA512dfdd8f959356662ad10967edbf36ddf900a94860d968f19761ca07644ab4d69e4d04a05a02d5d2919dd857bf6bc6ea26d1ab579be20a880acf7ea2b698c58c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe616bfa1bba683303c3926503650b0
SHA13ae9dcaa50abd05853c7c5067cdb4bebd1c989a3
SHA256aa9166571cf3fb5268d02cf8a51486bfc9f667bd79301b409d779e0902c6bd2d
SHA512b20500b562282f65c52a3d5128b709cfb7a4f1d6928629465383762a2c2db20cfd9283a786c3abcb05eb279bf45ec23e943affe2e9b30cdcd0f20f40b39f8418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9e04ddd297d4aad4cc578635458d5a
SHA118c22755770704dda38e2e123bb27358db18fec4
SHA256dfdcbe530f5d1a6a75fdb9ac06f09e81ef0c47ecae7d5d9d28c442f41db5ac50
SHA5128d3b82aeffae3d5a7784f8d87ae7bd0e3975a35e1e559be09df3467507cce47ac660710cd036648aeb126c5f8b104078e8a38471453f1f8b5b1e6bf8c3d17607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5573c97e1d1b961f5ad71490db83020e0
SHA108f4979a7ad2931e6419c10f1f93026d4a320a65
SHA256ac153d180ed75faa84fedfad4a22abb22ddc22021060abfcf5db65c743465c38
SHA5128f6df99f7beb07c04d0ac4bfe445752d13172e14ef9c5afbfd39706d59ba81428c1a770dcaab4ecb9bc3a217d857729afa071c0fc5d708ee8b579ef8abda9c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c445d99d152b112cbd8cde504918cf0e
SHA10cbc69ed3d52438d705dfc029e1a7506af6592d2
SHA256545cf800cb7d2b7892a9f55f23d420a896272fb0f816e57ce8ce855bf7af5bdd
SHA512ea7b79116e8bca89b267ed96ea65677b53a9dc445318df396d8182010d6203c3583fb1a9558bdc8f02849289ea7675ce836d5f91685130d61252a76172241df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40d8ef5ebb1ce9566a94383cdddb5cb
SHA160a1171fa7e6f05e8d1ee2cb9e8ff24643b28765
SHA256d693338cbbe8f53eaa4bcf4b8ff7a1b24c1ee694b08ded1a295801305089f31a
SHA512d2355547f4845d98cb9ad707dc2eef95410077ce9cd1b3240dc6bc18534b89bc2185eca3facef3da6af55b873ae9f5e389409da07ae82f448ce0c19c0fe66cfb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b