Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
d30b879144a767d3c082d9942484ad3d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d30b879144a767d3c082d9942484ad3d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d30b879144a767d3c082d9942484ad3d_JaffaCakes118.html
-
Size
31KB
-
MD5
d30b879144a767d3c082d9942484ad3d
-
SHA1
df21e753a1ebebe46b73efa17ae8f33959aa8aff
-
SHA256
fdc75b90c538f7de29a01fdd84ce9003a4a7ed28f700b180422482fe233205a9
-
SHA512
4e5d27e92b19088942179cc9d973a41abdd81eb7353d922284040eafd535c1696b72c2cc69a2fdd8687b29aca7f6e1e791f62546bcb71639e88de9d7dc89176c
-
SSDEEP
768:SOXdS2+RFtZKXzyEMwXqYI0wup9s7QXyXoqfTDYE9y7YSBVOB6:SOXdSRRFPKXzyELXqYIVuz+QXOy7YSBz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000062b0422a2f28838686837edaa74cf3ae305063c292dbe445a5beed18c545b7fc000000000e800000000200002000000004429450edd94da9b6f98fed53098f1afb5e76f441b1e68f26d7feab4c50966d200000001bc4ad2d9e9e56e1dea17d79fafa8cd8b849da187bf672e66a91719c5aaa3c8540000000f778af5bc362ae29b3643cb93b03c7b17d7e6294621067fcf1778285d520880f49cd3a65a336bb5ee8c5df882a584edff01ad928daf91ed515bb8e06acba37b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431913348" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BA4BB71-6D70-11EF-AE95-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01737337d01db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000082140f3409bd82a03d6e10c268deb0a3978195130ac4be84702ec13be2a3005e000000000e8000000002000020000000787d82fdf012eef2e320c02df6255d8003778a5e1f401bd8a88f4642c55a633c9000000023f8996e20301b0ac607394eeb536387a6e26c71a0bd5367ea2d6996281a001629a5d4e20d6fab6aa0760ff566c9b4006f8192ab553b0247ce98228fe41b484a315dc76b7c8af9b54b909ef706f1c11cd3f66848931653f598de6c993f6791370aea5da6446e859103a28a3273e72ad9acb6f854c214f713d0da39c894fea5fde7a4f568d7a9f4ab0766c43bab53c08d4000000002eac0da3b2772f0a9f0451fa8b7f237bd7e352f92f854a14644cc2ad8eeddaf7fdf72cdb51a0fc039612bb90621d663d745bc080c71e255c92165a40c9e4c1e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2656 3032 iexplore.exe 30 PID 3032 wrote to memory of 2656 3032 iexplore.exe 30 PID 3032 wrote to memory of 2656 3032 iexplore.exe 30 PID 3032 wrote to memory of 2656 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d30b879144a767d3c082d9942484ad3d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b71c56f47a03b5b4ed60a0e52eb66ff
SHA16063ad5db9f8994bbd18bd79ff5c2a3bd339e08b
SHA2564605d8b0afce2798db8229a2c577f4a76b513ef91a9dd2e79fadcfceb8b93c62
SHA51278b29ceca8d990244813484e1748e651c0c0b921e93a15de004a2f781313be63cf82e7d630dfed3fd76a8422bdcd6dc6ad40cb78c28ff1c347b571a2d6a4ea51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d8eb0a115d4625690d43aaf4506a51
SHA1a6e8b152db4cf630a3348d9829e73b072f9d8930
SHA256be6a9f01b0ca7d0fa366ceecda3fc6395607e4c10ee356a100ef24bb78d55f7f
SHA5127edca5d1a1910009a3aad5f5db5fa57d4a85aa050b71e25c56bded084ad5d607224e081223f4f79a1a6087729b25ec29590d2f09f866d3c56d7fe15ef109d478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54116ca12d6ccf3ee553698930c895a5e
SHA1e4eb4c40f2e7a9cda5318bedcb506ff26906f746
SHA256838b94f6dbdc29143d540d1b547c07bca0cd7e4d77bdd69cf24a2f06f9e1f93c
SHA51287363741540e35f4f152ade20ceac2d0ad05a1de8a03ee5159a2675303c39687130e9a1f5b2469258c04bede69a904767595d528ad5cd2b8a0a45f197f4ad647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc288c35474edf56e911d12eda3d8e82
SHA15dfb1fb543379369332b955419c2f95b2935b737
SHA25672c67107b5b413fb508a5d578a20244766d6e089357f143742461dea908ce04e
SHA5126b209459b08344a2d44f86db10359411fb27939eeca4a2b718ef669431aa4cad9508e440e7bc8121aca1834fb62216b3576a48fd527ef6bd8eec3d9942ff54fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2eed5737b56bf8a5cb22e5eda5aa1f4
SHA1db9852d62f2f6758a6a23a997f3317bccdb5a015
SHA2569acbe2b72cbf769bb86932752a6de51294deeb66e20a7bc34af12dd677682e37
SHA512ccaf76eaa49d88102a579ba717a0f0cb457d11d97c7c492df642fd08176bf71c564f5c9a7beacfa5c77598c2c413d7d454b7fc1a730a9b617893a3b6064e9d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f442f9de9701bcf125f1e6a5ecbddc
SHA1086fa6a0bd1aa1fdc252c7a8175dc52612456258
SHA256259eedaa0a4e98dc7e3abcbe6da691b176c362417038e6c539815b2763015dee
SHA51218042f392e9a5e31fa11c9e018638002ca43d1e646b65389879658dbcad14c35812a19dd2a90724d765524782a43589499fe73aacb026b8d0a86bfb81da9775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e90e7c980f813be34aaac854456e60
SHA145171d1edb25c8e94c69bdee6c62aeaae48aba5c
SHA2568f1644c92b0fb39f31cb2d2747980c4b95b6a6bc40c06fcf7c8ea1d77b1f74e5
SHA5125716ce028dcc827b0a6777f354707f24cef9897a59989ae84d87576ff849ac4036f94b1c568a615e841c3a7d6ff2ff2f7776dd8197c9dc9d5a8d686a9d5596aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2e817ea300fca4fa18caf45ac3f1d0
SHA131a3c23757b7e7d7ab6b3ab7b24dde0d3425f4db
SHA256076f2f7d5b54b3be5cba92099d92ab0cee37fa25f46bae6bf130910f5cac0c76
SHA512961a4b9091b7254e36f82f257bbb702bd2b506495023e140a2af71636057006b660974d54782e6cc128e77fbfb322af52be02cfd0a65ff2bee9849e6854e8c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd6c64cf1e8a340a85238096c12f6a9
SHA1f41d150b244b97dc8cdbeb48c24259639f3f6d22
SHA256168459077155ef9c18061bc66c80c149f4fcc69f99367399d06c00e0985c9a09
SHA512d126ac2125c33ae9ca981f0dbbadcf37608688c6e647dffa5a429d55ab782e0a2924b2708467eec9a5f65bc7a437e1e15d20e3e49849d086183d4beb6d3a8865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b192621c3a0dc02ca296be58013fbcd
SHA146c4d9f49183e6040c7ac66abd03107430b9b29a
SHA2566904e79014e6d867796eace9704aacc81d900aa2a577230ad09323e1ebb79e88
SHA512b04ca84b8f8530ebde67d645f26a3ac8ba59b520d8eed1110532eca2f8727c2c29b52856665393b7446f8f01dc813e6632b536e76728e243f6909f4dc1ffb6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da6d0f0b7e7e64b9e13d1f0f488f361a
SHA157252907d7c7bc04dde5664196b7692932793184
SHA2563c06d348c9e79bcde694cd49f3203304462e15ab0908a1b4f8ab43b32f88e49e
SHA51242159b3c40fe9e146da603b14dcd796fe88c0c6c5e54a6cd884add7c859d746ae2507728d2cb9f2f211e0685e01e28d7f02e7884d19cb7601951d4d86be2637e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed729da6c07a94fe5430c0adf3350f31
SHA178bed53464f503fbd4e4a53c1003ac225608b985
SHA256afca56cfe9291f9ee1c2192498ac5b4afaaa9bca92277f3aff1b06ec635cc20b
SHA512d27391a8c54c9d09c6d5d7492aac8be07f53eb81b06c9bf2f40f7c68280033283607776732f0453c9081e1af0d5b748d341c2bf9c1a1b3d17b894f9aff2060be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c4774cd2ca8357ee81ce2d4a2ef2e21
SHA1d815f1b355978ae0bfc1daad4c92e9de88fc8a24
SHA256e4a3650a13fcd1293fe3ef65f6aef2cf73245a7f2415e221a5ff07f281173949
SHA5121cbef2c2d023b01239eb05bd7e0057e2267e4b38c91c0076c856c8b84f1e381d1aeecb24fba2c9e23ce7fe3cc7f817c9c0bcc601f4d6f805add73816cec12f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe19d9e148068f10e583e50214d2e7a3
SHA10d21e2568fe6ebd4c973ff5f9096d7dcfa105290
SHA256aba835cd9496e9dc8e5ba851ba57fa140f72d759bfe74229f6f497b011a86522
SHA51213a0e6c7ebcebdff263d8b4111d1959d28ebc0d8ad29249ac034494ad5bbb7263791a5589a130b72b29fb366aef9cc8d8a1a8ae59551781ab49cf608a16a3f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55eaf22e0b203ff634c773b245c3384
SHA1d25f8af17e8b1390c6033fdef401c6fd7e376f1a
SHA256df754ac4c38393b1a754482a8fb8e24490451a5b5ca33c2397085907c577f8ac
SHA512e7d0d8c6766279979dc52b45c1b2a92877d3d131e2bac6643c4edb5f55b3be60560f7f77c44e6caf90f9529620f6624382b40da7e0ff545f5fbf12b4afc8da1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520106ff557c17ee7188740be4dda83ef
SHA12b14ebccd7d4fea570c108db9eab62e1c2c4d123
SHA2561a3e9ae5db58469b2af3a40cc225c5077e5bfb3643f7968a9fe435e528161d80
SHA512f0376395b680cc9a2f85702cfae0cab34ef1854958fad1da6d7dc4f6bb5b9d0b6be0e94ae2320a42250b8fea617be808a6827c73db35347f1330aa180bcd7d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06ccecf80d38caca96b838e9cd4b7a3
SHA15a6bc7ac535d4d56ff4b87329ede559e21760df2
SHA256927a06621f0b9d9da6c26d7c012900b322afc4518876ff72d8fed3235fe6c1f9
SHA5125cf9bcc7d2bdd4b6b12cc00c8e85ea0887871bde5d37c14fc46e791b9b121fb20257722ef278f4342a2e31c047b445d1953119050a26c745a36064c63266cc25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb83531b69fcda764209c9cd2901ab9
SHA15ed479b184f7fc309b18d290d87c042eaa159b2b
SHA256e4a8404a744fe53c916e6d2aa2c8c8af4b71276b22fd25f8f31ccc0e06f33fd6
SHA512019b92bafeca847a1e0679e5a39670090f0ef8338cdc6efa3f75e0fc5347b4b63085bba169c83ff04e973f16976179709d4323ef8eae051885bbe71f0fbbabcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe5564bc964cc01c2901f21a734a441
SHA1ed0f9fa13c671182be01d1dbf0bbcae1b87421dd
SHA256760b5f39e38c6783fc65887831021a26d4a848a887192e2409e9c02261927077
SHA51209596bf4caed5167b6f6ee45ab8697b8cc294f5bba6daf72927491c499597b3c35d91e43cfda5b2663b1387408222466e9ce510809bd493038c5cdf0b854937f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae5f6b4bc45a380c13ad7640b6d84c1
SHA164436779143e287c8b5f80bd1f2bb641d8543491
SHA256c29ef4af27c78d556f8b6bca6fb97e5497eb009612c554ff18fa0f335b21b639
SHA51229b116761230d2401aad4e62ecc3d168ee2c874707bb41130620b933bc7636b0ef574eac667cc0fdd032fb1ff2c408e58c836b4faadf9209f2bd8deaca854548
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b