Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
bfb0ef0c84ec7bb189b7bc49136b8968_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfb0ef0c84ec7bb189b7bc49136b8968_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfb0ef0c84ec7bb189b7bc49136b8968_JaffaCakes118.html
-
Size
16KB
-
MD5
bfb0ef0c84ec7bb189b7bc49136b8968
-
SHA1
d1034ad5de595fe7cde9184e733c8c93c0746cb6
-
SHA256
091be89662ee0bf20e46a584bfe0905f195a6299f0375eb2fb365e6541e4f087
-
SHA512
4406f62205ca33caad9557a3836a8d59ff85195daab07479abd08d87d3911abcfe6af89de9062b2bd9916af5efdeb008f4e8a9c50383d5b943791b7c549d5c94
-
SSDEEP
384:IgqybHS0qYtQlhzuliD4rWGISmb659CP5:Izyby0qYtQ7zulivrm5925
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000381125ab339cd685eb41197cdde857cfe41c2d59f4bff2d6d5643b76a20152f1000000000e800000000200002000000017c088261babc2deeb8e8be95ce6e86a11d79ce6d83f605f9866790fed49ccbd900000006053ba2c6becb507d62632a6c3dbcb640f265837b0b860a2bfdf8cb81c38aeac590dd0adc194ace88588fc08ae3d442d38893c539855f19d122dc748a1691c5110a17b2bf8fc46744569c20afb8ac8141925d2edcae4484e21d3e3fb48627e7e5c685d681908cc8189f90f38487663077a51461f6070bda3ab4cebf60742678843d6d146a6dc7c548e1f04dda33996fa400000007652fb442a2b457b3f71a8de8548838e24e9f64fd50ab423999980d970e4a39ed44b9e47f871b0d8de5c8b5d525f78a6542344eaedd442c8d0955651689b9ad4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03779d180f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F894B0F1-6273-11EF-9637-66F7CEAD1BEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430705439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000004bd78143ecd6572d4b444545a6a99937e480c1816628687a04929c68c5cc0995000000000e8000000002000020000000ff8f480c6a684350044f3317fa7bf462ad2e4a4213a8359f0d85f17c09a12873200000009721d5d907fbe47bcc6bce0a3dd42e0612c4901ef646646feb4461516504158a40000000e60fd958ade6b1a7ec32ecf93a1cb4d3f5dc4a7d6d21cfedb95df93c840946493060d8a8a320084de4494d7034cf9e45daceba38f4910976878f8045a563f9c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2072 2232 iexplore.exe 30 PID 2232 wrote to memory of 2072 2232 iexplore.exe 30 PID 2232 wrote to memory of 2072 2232 iexplore.exe 30 PID 2232 wrote to memory of 2072 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfb0ef0c84ec7bb189b7bc49136b8968_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514904ff7b32f566f68f9dbfae54638e9
SHA1a1c02ac1c50bab4671f65514dcd4e8ce6f4b567d
SHA2569912cc89e78b64e3567114907c8c28c820911b9b8179a4fd06cc85f45a760479
SHA512e9e5410aeb89d03c8263665cfabaa67adb849e8ebaf5df519b175354063159e0843c182801d4e61f8a7eedbadb555f5d23f590dd14d72af955a0be49a9ae6be3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab4d1d42852d04ca5930a80b8500f62
SHA16fc0b886862e0f7762371300c24114bb660fac09
SHA256aac4c2732bddcd79e8b3350a3a3689cc91a3e3bf1ab1c502bf40003197e48d60
SHA512d61931cb9c92bc55e47f48316319a0a5e2b87e8edb4fdb204497159dc070842bdd61f6594bd8a408bebb3df923e2b513300da12317bf4f6252f34e26029b14e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf0af89691f552fc0f3947cf6918676
SHA11d5bb5f46837a2a2e8d3c0826f64b5ab1a9257ea
SHA25644814a59f5d6d5bf6d0a3d12c5d0095c3d5d5227aaa56c697868de38f388c7b9
SHA51212ade8651c0fa841fec2cb2dff6caf6ee78138d496a30e19e127611604f56d0e4a1d408a57135f636ea2adee22cccd024a5de1659431de398421d1fe64bc12fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a52f2a82115a72c971106a937dc98f1
SHA189c4e5069e6b1fa9e4cb76be424ee540716de133
SHA25632282f113004ab51a05a8e4934b6d551ef2c950d5c2aa7f2dcb9176dc42d32ff
SHA51287b53249294be56088f07fbe0cf4f3ce03f80be2b94cdf6ffcad736870eccbbb08a2416c734349a710b8c24b02249e7a24d91aac312c9e3bc6e3490c7339a484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ec2f2bc98cad7d57ed45c4c6b92cc45
SHA1864056018e4450b4feda97be820f4f3607d3c17e
SHA2567f48e5de8b2a858b6ddee86b8012b9dc546f7a1b5ef340bba8349cca8b17b13a
SHA512328400e3d0d6f3e412e8ad0e05de3b7c297b60b79d77527dce18110062e355014bd0985cf909170524a656b5f25753d9a30abb4cdc179d6d37ea1b358f2d1456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593bf413c82e928e5aece2fa2fa6ba4e6
SHA129577b02d9efa356ee480716fdbd94a641753c77
SHA256d26b3f390e2f66f09da1b1ee68ea6f666efe67a6a7d5416246402b97f2bbebf2
SHA512e001394030f50979ce3ee89017df3754ed6fde19c264f7ea5a4c58efe0ae38cf64dc1da4ee3fd75c6c034af4d3d010a03a59a508c7574b2c4a0939eba493c745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ee296a0dd02c0c07009ac1dd1b6f53
SHA15a8d2a8340531893962d24c49704380bfec12aa5
SHA256cb4fabe3f0c78cc613aec32f64a654b4cf811249bfed32b577fa35fd40278ea8
SHA512fe88bf203669d42241f2377849e75415f9eb94346823e379335dd5019c1e93ca431e8f27144d704f89a90d373bb8213c44a6a52f6637bef9d0eada01633dc935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e96feda078ce0e59886a168cb7d239
SHA1dc5f5658bf05b633a1220b127d7154b1218f215a
SHA256eaa30652ef5793b5b35cefda043ae075cda47dd5a98e2ce30bf537a7659d9911
SHA51289e5a074efa63599abf03072bb4907d42dc89a5008c78296b432d97e517bc9b956c4d9fe5ffa02b26944b235565db5fbd37c751f342265121fa248aa61fb897a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7a3fe3a086913c30a4bdd12c212cc2
SHA1de91db49aca19d9688fac999fbeeee44cf5f433f
SHA2565ded29a1ffb9cb5c89632dba78f250b02dedcd7da34d808e2adf345a5e6f983c
SHA512b5cd5529e4e7dc286d282f2226b5582c5bef07a037dfb2c3f66c28299097614221acb4fc7bc5bc7795c578fbec8556d1c3d2f36d4a725c3bcd1cbcd226386af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bece192f2af1b2df6d753286fdf4216
SHA12f3dad2992b7d70a7a509e115c46e1b6f4d9db1a
SHA2568261b81fa601dcd24552e8eb6cf1d3069f5e0be7cd4ee201a8e4a9c8a4e7743a
SHA512b0650d7a0b5eee4b3f0abfbed1eb70439d3e5c75c2c4de29274c1e1c406edecf1951a16df126f2c608d2dfd39898af68453f795112e3eaac4ba66e622a308488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5815e50da3e44bcf67769048079bd2f32
SHA1efd2f7039b6334c3e86f84c695b362475d004e72
SHA25631a44be32a8f89a8bf0d18608d822ce1172ffc7c53104896c554efd5ce4d55b4
SHA5124c55cd6ee6df2017ab656eb568c73acc97cd5011ccbb034984f41dd790e8a82a1287273a95d72bc9a6c78871e1d5f1cd65bd56ff361a649fa4bdc8e1f7d92b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9ec1c47418b49cc83e324be16cadb1
SHA1d2d85ac9a1d74346386f92f4d4c1870c9b0def39
SHA25643037d87bb99be554b9fa2336f72abe4f7f2d16e69bdd741666f7c938ea7aec1
SHA512ad7f3f00be643906e182697680e64868a941d6c0830754f1f7a45bf13cb15b663860343226c74873d7abe6f0bfb2ac69a8031e5302df279e91ca4d356b596457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9e9c06cd797224cd6208901930c228
SHA1fa9e14b5efa651ddfe12863bc7c8f00b43e5f701
SHA2560eb5936407ca1ab23f87552855d3375424fa689d6f83ae2667cef601ca15e90b
SHA512ac9c86374fcbd2a74f17df9f99341a9cbd71b572df410cb54f34957c83cdf79c6f8adffd76ad56364926b07b54d9a752dfba853a15f34ba3008febc66d7fd1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7b20b38babfb80ef3c1ba77a9fb03f
SHA12ab2f8dd1c0adcf05a5a835ae1eb2da5675439d4
SHA256fe461542c2d4823cfa6db2f36f3e552cdfedcfc1ece55a13f8cb4285220c15d8
SHA5127a319052445acb4aefcd74a4bf7b1c35f3149d7c61a2d26ea02b2ffcbf4946e95703f6b524ac2e6f493ff891145709c3ac8a64eaea3bb76d2707a4ab22a4e455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f63513c2a6a009bb93a94fbef74a8a
SHA108a10be355956aba7010a8e4eb56bc85957cabe1
SHA256cf62380cb717b8913ba0790c563ab5414022628930b00a9c4908ff853796e7e3
SHA5126736e49ddf79addbbc4ac7be2aa55bbf8aab6fe77d53f43f5271da389d50dbe03bf09fffafdea88823f46060d6653913825ace160ee5200a295d7891f413a949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31a1cd44f118efaef4b9d748f2561af
SHA1e0cbe91c904f6d8262a30d8e2c0b14adff2b600f
SHA256fa43353be715b1e063f7d396cfa8962f9290ca8dcb9bea10e0aa9bc13ce3b522
SHA51233cdcb307b66e05cf93c81aa1d4ef648c00b83002da7cdf0e9fb23606ed1262cffdc4425b8ed7ee90bd11dbe9898f0b42ed238b75c31dd9e56372091dcc2e74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d2aaa227f79239d32c6a5414a6c8e7
SHA1c18bc56d8870446084648d62f04e723c257679ba
SHA2560196a630e01c9f6db09e5f38e7bc3e2b90e5ab09bee655aa9a94076e80f6852e
SHA5126c80b93a13ac242140bbef5073925f786bba37d7b8c6f0330d89065e643216c49bd65a9c0ef85f1a8c45a87d3fd992fcdfbb0795789adf5d9b86fe316ab9aafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a51eef5ee060531a3b6d537e72c98d
SHA110da5005585455be67040dec42b92f8a8b76ac18
SHA256b52cd3f8fd1f674eb80307499e10f44f85f58f98c75ccd08e19e773ac26c94ed
SHA5127fe23807dbc6a2a4455bdcd2413429ee18852f730866dd943811dbea036b199540d5ecc7a5f2752ee67e874da0173726e9ce2711a3228cb24899495e667da1ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58781c6bc63cfb4351a6aa3c317aa1d28
SHA1693f4d01eb6b88f9d4b4d4eb9420196f45460fbc
SHA256aa0dabdb7db21ed5282c99ec8ac4df29e2e96b109fbf7f92d1da8bd1d5873221
SHA512806f2ee7c5994d6d7b87f3c81b83138062549627a93e1dfbd27dc92487a0507f8b3947c458409363c4c7cd347ed00e87ec7a3784a9fdf95de65edef6c00b6866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d380ef15ed1d401ab73632748922a92c
SHA1c95b03a67f252a29975ced3d1000f77ff4bf4c5c
SHA2564cc483445481108ed2434c4f5e789a58ec08c0fd61604cb880f002dc355aa36a
SHA51279a061f21e71d73c4b360274907382356665382ad8bb9beb5c80e064b7e5caaa8631f9e1f086a6917d3b53fad093fd7eedf2989a447d2fb275c86d787b8af35a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b