Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
af19b02cde1bb2840486c99d9b4eeb3c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
af19b02cde1bb2840486c99d9b4eeb3c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af19b02cde1bb2840486c99d9b4eeb3c_JaffaCakes118.html
-
Size
456B
-
MD5
af19b02cde1bb2840486c99d9b4eeb3c
-
SHA1
5d460980949d62ef675bb1a990be765d35b2b77f
-
SHA256
a8b6b142befd09cc3456771ecf44c2e93f87caef8d8d4c93733842e3cd503982
-
SHA512
c3f6dddff38d7edb32ff8b1af9be5296e0c28c4066193e1837cf4a18208ed06163922635b4565933f0713b3322c1ba62930fc456b92fecaedcca02292929b929
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000e259b8446c6603f5b982404414068817841640aaf02c99dc3b9d0d433860cd9c000000000e800000000200002000000088d1792067f352925ece20705ea0f65baae7546cc283b0a366cc6723ae881cf12000000077b7df02bcd77c1757fa6eda530089bcc287945345a26b3243c79bc0fc3ead6140000000258f0c81a056e90db73fd1b93ec2705385f85aef2311bcf7372d900bcf79f58e53a9b0d5fd0c2712e828a18aea83483b580ac0af4535e17a701947ef2d61b098 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000a07f1ff3c197e0139b200a29795e447bc0f7f919a02a0715d8e916c31c4361f6000000000e8000000002000020000000a0e6baaed671d96081acff986b2bdf2ffce50df4b1cc0fa720a888556b7e2e0490000000e139287691b5c68d220b09d27e075d742c58794347e12ab817c2043c7153edb6e04a55211e677567104cc589f1a9bea6e1073f6109caf03a831c74be0a4be2e259254e7c6144fa586b379e4920aff7bbfa74cd7682ee8d6d0549dab03440a5287593d5ee0d12ac3c2d34b54a6a55a67828843c52fcf44b50d740dbef2422acf868b7e3f28cec41d4925cf9a092d8f98c400000007a5173b953550e33e27b1d11629f18243b387c624b604f3444abf612d7d8dee898271572c70f039a10e5729804e403d17a2dd1b916a298e873e028cc38aa750b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430316415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35605A81-5EEA-11EF-B6EF-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a11ff8f6f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2748 2800 iexplore.exe 31 PID 2800 wrote to memory of 2748 2800 iexplore.exe 31 PID 2800 wrote to memory of 2748 2800 iexplore.exe 31 PID 2800 wrote to memory of 2748 2800 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af19b02cde1bb2840486c99d9b4eeb3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ec96acbd2d54db4adda397bdb3d89f
SHA112320e9e1cecd0c63641a846d38bd8195ae6303b
SHA2568ec5df42f75b33dad3c2dd40812777e67483f953e688ca1da6f19e01ea8b9e88
SHA512c613af72fa44a5a639d8b871440de545d386259ec836af21fe8c7a4c031d953e793e24cccf7ab54e3657aee5663b50cefcb0fa61b9c629ff3d1ff0795cd2dbc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5191fe35dee35e17b185571a3a517d2c5
SHA18fae6f4a7523e495ec7a2682d409bd3df0a7a781
SHA2563ba689b109f6f024f52621bc164ca149f913531133e32045b635bc855af98b6d
SHA512842c0c0c15ca87c2b6be27ff09d608acd33516a1796e846b15270e645a03b8f2662500b5e88f91f3436244a5746aeb92967f34c9620737558398c2f39aeb7e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dae2e93c680fd98c5d3dc3f7a31058
SHA10a0d3ed2450d8cf150e9148672b138cf62857c36
SHA2561b9c9140fe8ac514cf6741e3893f11d468fd8736f0340d95b4c010e45b48919b
SHA5124bbad1acd4781e09f74ecd8695072bdfb027adfa8a4b1c1b3270fed2e5c43f05c9097f471492bee86ff6b952eb1db462aceaa11e8a854d83149efda868e00bb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d89242fe32c256d423c732add9963a
SHA1ac78a44aad0dec4f17c478e92ec2c3192779230d
SHA2563bb9a9c3845dc1f379da223a2880a040679ba30560e5bd2bb7ee82c6f0c31288
SHA512dd8ebab8efa691f202d6f9d9ca2bafa8e4e0b4d8366b5ad87b44cbd03d7c4497e5434bb9fcff907f2b6e1cd0aa89b8d39685211ac1c5be91f2f8f8a048db96b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb8545820e9edf69fe9459e68e48e8a
SHA17a5589ef3b63d72778922febc1cc0208c5c98b3a
SHA2568b6a37158c45c08b47649dc3e43ed727065dc8e195f059901e381ce7ed65bbca
SHA51251b1cbb44bf4237b6762d99c35bccb0f1e8d696474b380e3fb6b286fbb444393013bd79b0a6094694daea300ea80c0e26a5b5d8b7c50b4dbf67c1df7719a2218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58055f6d246fd086a368b8ee42b555d59
SHA1044bec98a510a7f85d2a1a83deead4abff72a02e
SHA25696bbac8baa776f4ac975e7e422f9f680c27a460ce80c2a5e9a04f82121ac5f9a
SHA5120aa524bef7417d52fa032bf0181cde114f6d26ddeb7b65a38a38a77d689c82ae08a9bc474265b3071f29302a89e45aa6696faf896eaacf1393a37913ae32ac9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a311941d089cf3f3392a30e3512f2b
SHA133d676af6b6f5ac9b673994f754900447b35480c
SHA256a01300c00a44cf72a6c9fb95a40174b1f66b2bde96e3657270718391eb4d3777
SHA5121adc8a36250d8178f38361ddd1b35a3ef7a70780ba1f64d76decb639da5f461de902ab7c73dc817b167e1022cd86d2fa6599a410fecf43710426f7379f247195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0ab80d62f5f8366987c8685c764376
SHA1e6ca9ea008770fa49ede30bce9064cb41614591c
SHA256d2f1a2241984a73ef906459696632e895c9d5146178547cbd757b574db53060a
SHA51200b1a1c8d4232ff3ae5eff8134de7825a9af1a47e22a7490cb1919736611f17dfe06dde07126efd5f4009a19179b1f51c81e3ecb7d1228035ed47cb34c7ab94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c636f5dd8ddbb84cdb85f4cb6172990c
SHA16c30cd9785a056eced01c77a1a2b5f26ad91582b
SHA256158b6200aa2438ffaad98289394c68d8dce7202a48a8e2736a430c941ef42bd8
SHA51239d49bdb427dc91a227c400c3992b3f00cbc5fd3d7b34a757210dce80b29c46271997ede9be76422904effb0615d24bed74f613ae137427498213cc8abfa0d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55167fc0220c4422bb98ae922b41962f7
SHA1ebb40700c4f9b6f16898f44b333a728ed422074b
SHA256438552d239911bf52b995800b20d10ada14d017fef4795712578be9f3a5e856c
SHA512b89966edee200418fd715ee28d7512a605ad4deb70d2d9757d73432fc4ab67669ddcc7458cf298475ecc72ce492c5f089294a401bf8a2fd2615a871c5d26043f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535078f5fd3cac9cbfeb4c421d2ac8bd0
SHA1b8be8f8b390d67efc09f724d84d4142f3fa34d35
SHA256dc7f8f390af81e58f3728afa1b4926c9c616083eb4fbdbfbe2ac48baa305c311
SHA512ce3e068ca117f62bb080a5fc74832cd16ef282d3e743448a7bfb14c6660179f357699d767eef9caea94bc0756e7d8d8c1ea4f0f496dd98199b01ad52411dc01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b29a0563ca4d0e2d435766fd0866e94
SHA17cd8fef281a225fd3a76655daffd37cd882965bd
SHA2563c37f198b32c8d3f1fb8bda3aeec18db278940b1d03aa9fbe31d38c34403ae1d
SHA512a375575c2a468eeec57b0ef0c120497dd45798a4ffe65f137aa665777d1d9821777da65e288be676f24b33a808cde5663f75938cc62c07ae92daa09f7586eabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569bcf546f5d35dc53d3c702bf820b64d
SHA14f1458941c8852be0950d8c2794f72c984ddc792
SHA2566a71521bb216017dda764150528c17b0eb3b5e4ba9a7d2f201b4f6b5e274df79
SHA512b2064dad21437601f2eaccdafe1835da2e9c50a463fb2220353ef1bf3747fd39cfea44640a1a6240e2e90cc026e6c5e107a9abac85d4675a593be9c132cee911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286c58074ec774ac550d784d328f521c
SHA1184012b3f7996976af6bf599d81256317161fbb1
SHA256f5bbb63a70c6796175ff1692d2f27746b99184e013293a14d94d6a42dfeee2c5
SHA512b349ccbee7e42303e4cc22aa1c64bfecb0422b794bad5420ede6f0dd70e4b410bdafce4ab44f05bdb3aa3429bdfb9b7eef0fe5c184ecf324258a52d6d2ce390d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3308cf1bfbdb00c33df4ac7b92eb890
SHA16925e2539b079a65d21d928c108a68a2affd9858
SHA256894ed9fad45b0e5789a70eb51d6ba25aeb638e1a00d6de1a1e24938a0e36965e
SHA51269995d656a34939d36eeda4ed2f5da2aff37c89f8c48919dcadae8184827952ee268c037a2ecc77de12e2f8c30c44e3d14e672e0e2102b0fb9120099f2c1e483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08e71b2bebd9bd3604928f727a2b035
SHA12deb189f7d6bce4fdfbc4899f643b985987b880b
SHA256f203681b42b37c76ff58573b4ba8981d5e7ff64811288b25dd0fab9aed9daf0d
SHA5128c56d6f9251d448caede5357f4e53f0db9b2d288c301100d804edbd608a2ad1e8a4dd2d0adb3b50f5cb50a6103f5d467721909dd7a290d0de549f82364aad137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c4f80bd7c1fb47afd722175fc567474
SHA111b86022ea3e87ed0523b55e6749e2ad73d81a0f
SHA256d06875ff166545460e51fc23071d9c73a8bf0368416ef066696f1f7a5501edcb
SHA5121a3863af2524d14b1d40cd6d0317422bcf39a362a5844bb405bef9f73d46d0ce4a7fd6eaf1307d1842402a4dbb829342fea356a743ad6b764592e948898472aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a402f19d4f4a208325c9d56c5823b9
SHA1669a314e8fcf3e796960c609cf01273fdaf25d1b
SHA256e4b765d1b8b53bf8a323dc5d0438a3a8bbadd660f1924950ce86d689db1a9328
SHA51245b5eca9317147d2c2579c665d778be026a249ede97cd3346ea6363074255bce137a27c8297294e29701e7945f37ef8dabc0ea76f41a06e2077dd3117d8c2cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6e72e96a6e327dd70c2bfcf103d514
SHA1b82cdf8db273f8ad69cd60785b2b124bda178060
SHA2565ea467c9364732b48eef246293134f43eb36478fc789ed2847588c600fbd2f58
SHA512aded3d807e6eba7277fe7a69e954353b78d857ac69950a2ba4b7b01769990bdface2e973c79dfbdc7f4b951302cb3baa5276ed84dfc6caf7ed2bcd462d3de96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a6cc9d7e872cae60de93f50a201ca4
SHA141ff6fd3ddf333f4068d4ff7cd4305aa805c38dc
SHA25606ecd981f2947131fca5b9a28e9c7d64098ae187a654de741df75e0e4c899ee9
SHA51277214da4e140446c6b99077876432c8fee895534fd72b20a0634845b3504968dfcd8dee3d4c611e5caae749239ffa99158a70b70a98845b0559cedc9d6ce348e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b69168fd8e099ee0215112d29099544
SHA1f2e5573a98419e1407661c9472c11f92cc566b08
SHA2561130fe3b6f8c805e8b0d0611d6330a383903148e941e97bdc9c3b3378e2371cd
SHA512ba0358d563dace672ce21d63386600b8f194895d74891120bf21dfb6bc14da5e04fe3ccc9b2008c893bfff466249b641be8ed569f49de9699927f2336ced950e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b