Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
d320436a8ab5ac9c14e558cd2a9e8494_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d320436a8ab5ac9c14e558cd2a9e8494_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d320436a8ab5ac9c14e558cd2a9e8494_JaffaCakes118.html
-
Size
460KB
-
MD5
d320436a8ab5ac9c14e558cd2a9e8494
-
SHA1
f6f2e52eef9fe5af13360337dc0612ebb5475d28
-
SHA256
47cf03ae28b63d3949b59bcdc87154c045b42aebad32e0252f4ccadae0233fc0
-
SHA512
98a8312e6c249d0dfcb6e0b7d6e7782e9a197b70071f51e238d0a9a3794e7b19503c11e198440a353d54855e57fb27a3ec0bbdd33bf78aad5404178764e6fd7f
-
SSDEEP
6144:S6sMYod+X3oI+YlsMYod+X3oI+YHsMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3/5d+X3l5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78028E81-6D77-11EF-9628-7EC7239491A4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431916402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000647b696d72a6199acfd64da117ea6e9ba5d7c83fbbce332cc69c0fe1faa44830000000000e8000000002000020000000c45f42b560274d4fd7d53ce5c02106718f22555c66505f9916151b62e29f4c4790000000e632b10d01c0ea15adc0a0292d280dab06d7f8f3f99a7a4835066c84abed5d1c20a1bd7bf8a4e60887092af348c514f4dc42e0bfbdcc885cf938f7f68afdff86269ecec111df081f4a74bb1e0a5a4eb0a4bfa970f47ca6ed91dc0faab42ab38d1265d919e924f2d3d1068e69dd1e6c5bd934267081626ccd80222f0b41e4cc72143997370dd7063f9fd9ff405dbb34514000000018adede8e4460ae6066d98595300d5d2038656c3f4ee2b74f2f523d877b5bed532a9f5dddfdd6cb4f35ec1cebaae97d4600d236df282412354c7fc5717f4630a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d285508401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000032c0ff28701f5698f50b1a06806e9e87207694b58e115ff524d969e63c83c586000000000e8000000002000020000000c885033d71c31269ba4751d0eb8e8630f8a7a7d7933f6ebbb58a3e76d73645b1200000006175c4e32f6a10ebe1c756fda4ea313d00ad7db58550725704d5bd835fe8b24e40000000afaa2b9a8e95238d721f5b57b3a63aa71c7151446e7d3ac7b4da752b489a67d04a2864ea716ed4796d5b0e6d31055867ce83146ffd755e2f2c81c80a6b1174cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2748 2488 iexplore.exe 30 PID 2488 wrote to memory of 2748 2488 iexplore.exe 30 PID 2488 wrote to memory of 2748 2488 iexplore.exe 30 PID 2488 wrote to memory of 2748 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d320436a8ab5ac9c14e558cd2a9e8494_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c808858cea4977b0dc77b351a49ae05c
SHA1923b109966978e8d0ab911f08d2a81bf545f8d67
SHA256c8812e824125118d28121a73c45216dccad916bfb2866e85846eb5856611dba1
SHA5124fde474b7dc90c75453ab78acb8f4bd1cfe39ffba4efbe27b4fbd9a9d6b1642b61009294ca090fcf4c1ad53a5ad760600db73f02207c40fae6716f6ce363d60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0f9a27d876d2901e3133ede1b0b831
SHA10dce4d454c223449c2e9a82461422a7c2e3be6a9
SHA2562deb7c31668b92a28f29990ce588f424d68f5893ffc0f7ea39731fd74ab4049e
SHA512c52a7e72a65d8dc9a08f5f994a36fb22fa6fc3b754e591c56d0e3a7cdcbefb06182a1fdba1bb73d491fb03240696ffe5d50ed664c92d701ed83b5528b5904e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34b525ad45ab30fcaa8b006a8654a74
SHA1104d58a6c2d28da2c770e4479da26f8840692c5c
SHA2560c01d040504451f9cf9edc1794eebfef009aa7a4fcaa6e54908c4d8408fb3c12
SHA5123ecf6dbdf2d539773c7d6f952aa824452c0a1e9e17c0e6ebb737dbd47091eaba8c82dbe880d4146b971a1def42b8ceba497523083f2d3d68382e13a02b5e52d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d0c4a60a9743433f06114ae5d85228
SHA1bd63561694b30ab540e23e88004aaa0486f7596a
SHA256a1aab04640fa60c7881080baaa8e4af3fc9a911218fec46111f52b2287d1d31a
SHA512470bf0d17d6cb71019e6999a4e0cb08d3d88df9735235e52510b743f74e4d2c73a029115e5956e12e6ec178d7e667a8872482ace1811dff9f1dc4756aed1ed3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b248ee3c34863a3ea27a255d039d193
SHA1265d40df03791f64526fb34118f79236a37e6394
SHA256b408ebb141710e9b92c55b16be924213b2c0b7089836b512091ae74dbbfc3cc0
SHA512224e3753c926e4dc72c4a3eb52e24bf360f6ac78ccad7ef5d2d022272e2f144059e64e239ce2ad25ac8b1e5f4f02c6bc473f42feba60800dbe95d193d5293552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d4ce33f65e9870df4bf5f85a1351af6
SHA1ddffbb64563f7e55f0cc31713e3d80e786aef667
SHA25682096128c2ef0c0018d924246d8fc95f0604f713b4847d2b006544239e0e060b
SHA512a67ab1eac755dd7678ce1370a45d0622af5a4d66eb0eaf27ca4070a0620570a9ebb321582d607827609375f871d37e55bfb21b4c009badec269ade0f460ae9fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f97cc72703244b88057a4a26c3fe5a5b
SHA13c0cadbca18225dc1b0ae86df61a8d43bca4a585
SHA256ed142da1fcbc68223af1c81c16fd28fc2b1f76e4f78ff31fd1b8f0542851cf1f
SHA512a6b5978f021c5482659d1c9dd0c3327ea13bf6733a8a6b10cdc65cd20cf24bd9aa3177b65e68dd39b900a889acc52712fa3710187c1bb79a6c928326c8daad64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d7d0aa50e50aac8b09b43848d257d5d
SHA16defef6cbd2128c7a8ce4865a7a6c818a2b2b0da
SHA2568c39b7f5ff0f5937bf6176397a8f870778faf1528cc17ad7a233520e5b5f87ed
SHA512d85164eeda459231ec2f9899dc7ae3505bd966893183f3dba352b578a0a4b793103734100aace4d699d07754f814e7b3a7edb2701271c8c85f7ef55b7936123d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12d20c883c05ed8e9ca2e481751b4e8
SHA14070932feb6c2bf6c919921adce6147cf1f1cd46
SHA2562836c953ccdb4067debf2a07913925e85dd3a72ff50efbf363984459aa755b14
SHA5129899195e24fbdf785931a1f0b31c751b060b873cca42155cc3a7999c3e316fef263966fa3a093e1694d98db7b9434355c2ba77b6cb7c42588b905eba948a072a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b9cac262c28ccc38373bd38a237b464
SHA1bc71f8092ee5496211f48e6c3de7397ddfcba71b
SHA256831d68a161b05109137d7df3cbe8d5d1d2b3d3b57f8d7eaedd869e37ec8aa31e
SHA512bea5e0d11b7c3fca3aa46dcfb40e08d5adb6b332161af81f5a7eb8880449cbbad18596a397bc11e1996e143eeeeeaee0580d18f627267805c740ea2e36026482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c906f7847c687634e61ce49acb094500
SHA1253ee964a5f355ed14a319c2016080ff0dd8e4bb
SHA256a75dac21d6f18016207a1b10e7ad5a26883c5f7370c9a75d60047d8fa2d175e3
SHA512f4e0b76681b32620376410030ddaf454bb6b3d8981bbf1ac02b3bc65dd5b48f66059bf52231d25024cb7bfef67268d2e812a76a4b399ae5da0a46b53ac412635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384833c37ffbb199e7fe72e3374c720e
SHA1b23e29ad6ffc64e7796872d8feece231fb94f59c
SHA256949900afd5f3e8dd70287fa4b802bf635836e77eaba249c0a8d8209d9eeae995
SHA5129a6474618856cb07b9664b722807e56626157fe2a68587a2fe8a582521b07b9384e5c7afb2aa90a047b77370f122c12c3e8f1e1be22a7e5c1e7c66df1652dc5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d38df27782ca8f8a4077d46ee8ad49
SHA14bd19124cc5871fe3fdb9121ae29c89c9dfc4b18
SHA256121a21c6345c321daee3f33feb953da39f646d41177daa7f4ebc27468bf0bba9
SHA512526a81509d7970c14d394493dec153a2e0058ccf7a6d572f2fcec011d009acc9428e268e6283a3e5d224e88533fcdeb4cff68f1a8dbddd082624bbe1a5d919aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51a3d2ad50f63c78628457c01b1df99
SHA1799e17763ef5aa849b5a87b2e087d3ea23305942
SHA2568bc157e9db6daddf6ab720073886b726ee9e5aa57020b296d5aa68d2ad9c6366
SHA512a34cacd09028bedbe96108713b3e3f4b13881773847bfbb6bcbe496ff82d00b39172b102ec52e029c91be1e600626fbd9f13ade635d2fdfd9b45c82dafa71c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da71499cf3aa7966a0b62abc30288aa
SHA160de7ce1f3d9ea9fcc91dbd6a4fcb5a3b50fca43
SHA25665d7c524f84cded31c449455b72f803b47cebdba8d3b7cfe3eab8e0a369de505
SHA512a374393cbd487930b08749c6184b9aea93d3472dbb60433eefce0553880c4fc617bcca4a75b658ebddfa4cec8d53e987914cbb2f3918011d434ee76d1116b158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf1ad09de80d14caee43a2b556b3c3b
SHA1dee0be6d90856d5da8f94660437da9a47dd403bc
SHA2564095348d752a299bc972f4a6c6c6a4a7f3e87c42e46af066bfc5d62619b98d66
SHA5121d0a4cffb7e7de1baeb80b256da13f71f1e8325e19ab8a7496e2a6d2b55999993747a62efdae59b50edbb75925fbc9026772514741bcbce40b62722ac60eb2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02ed5d9d65af4ab491b92c545ccd6a6
SHA1803274ca43a3e00cedf2f9b58218f44db7c6befc
SHA256edf96c1f3aec67a8f441c0229b43a3703a0276d2aefe82d8f3960db8a5d313c0
SHA512e3ff76458c639d7272cd436c8d1b113741b676cce213ccd8de11b5c0084bdc5163c522b644ff56484b3ea9dd9b7d316d38c43205bab0085ed808140e9b3ae108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7c48e60c0605e1ae77952da097f9d3
SHA1c94476755d93a4373383e57deb9baa3c493fad0f
SHA256a692576a6ff005201ea1e23b60541be16db4b34076e5e34bfa0fb6283f408233
SHA512dc3c218e4d32c1e596ab0da9eb04e3263d522036a35e6dfb454fd39a05f8faa4efc401867b2344a7a4bcb827b8c4b57e08bca6f796c080f37de878f473136ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ce0c186b3a49172f0407331368cb25
SHA1bf8c46ea7b2fed18cf26b75938a76d5b83e16d2d
SHA2568dfd2f89ef5917a3f92d5665135fd03c3659096f1c4904851830b5328c21d838
SHA51206401598a19c64ff94487030e4403f8ac52dfbbf636247800b548a1d5d420fe98c56b99daa6a8ee0e5f9ed64cc9fcfaa8aa855388ce33eb104696bc7da1e5395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57037c98c98a0d37e72b9401411f783a6
SHA1afefd5263c345f4bd38a3bb0d8d1377e4bcbcab4
SHA25655660fc8f43ee7309c8ffc1da6f30991fb55aff43a6748d29b16941c7690ff96
SHA5125e855ebdaf7d77d012ee21f738f8ee33a90ead625717bc455b89d2c8db8c91a7c8c4489d7f77db3ec8e0cfe7012133d1f2c0faddfd621264f07d7e57f832734e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b