Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 11:45
Static task
static1
Behavioral task
behavioral1
Sample
d448f3e437e0961b8730fb7990d448e1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d448f3e437e0961b8730fb7990d448e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d448f3e437e0961b8730fb7990d448e1_JaffaCakes118.html
-
Size
27KB
-
MD5
d448f3e437e0961b8730fb7990d448e1
-
SHA1
f8d8009ef2cc2dd81b721a031c165fa88961ff42
-
SHA256
b65654ce99a954051966efd9a9bb804bb149394b3fba4e5266e2f5df5e124da1
-
SHA512
cbf6b060253c2155ff5f276bec7966093da98756d4e43f7c1ac7a48e29b8cbcda759bc8e0b88fb188a9dc07fe6c671c891b5c41c2fd031cec122ab265dc003fc
-
SSDEEP
192:uw7Ab5n+enQjxn5Q/xnQieUNn2ApnQOkEnt7nnQTbn5nQ9eS8m6udA6Ql7MB0qnL:nQ/EAdbkwAdSeR2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431957806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006778002a5918c41097cb5b8415ca9602090fc33317151f4218b7eef62a7b661c000000000e800000000200002000000013e5e881ecbb08e55f10fa09812a07085c8f8decd8df6b8119c716e46731894920000000e22e258232c3ef0130a829d1bf0a720d98e19c50225b554a3ec9f38be991514b4000000022265128df580324bb44d50c213e36d119755cb32ac68388d70f4ac29ea0260cbfa0a65cb5c61ef702f5791b17f670f4074f5f41d9cbe41a8849196606cb16ca iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000182c2cf1ce5e5cae020327ddd468faa40fc9b287b12d553c6e7d0af9981bfeeb000000000e8000000002000020000000181b5f1c4d89be455e06e601b3e847cceda2e1661ba471d5baf0763c9411d4ca900000008d24430978f3c5e94b9cd8dad56746e1d16b0331a41073ee67090d3b25caaba0501228f45fed16c11ead594d36ef81d67d4db445bbe02d2f54b036fa18494f3a5123f785362b303e2123e25239cc95ac7bff4c84e50e6abc575728c9daabc17b7c022d04ee36bbb22fffe149e784f8e1f644a0c92d3e645785936888edda463868592371b43d62550730b1d9e910326b4000000048fffb85a6c9c750d19b7ed05cf9d5b4c0899981ee1a163643d915a31046f13a3e48d114b2c287d9d81b0c73eafa325621d9031b830635403185a7f871b306b4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bc00b4e401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DBB6B861-6DD7-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2088 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d448f3e437e0961b8730fb7990d448e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a13f07bb8e7000a59347b1cf3d299e
SHA17c5d01c79165b210884af47f00df805f5fdb62e4
SHA256194cc124df3a74e510e0890de61f441953e50e33ba2629fad2205f358b1d803d
SHA512e85c1673701951263d36131f990dafbad8358751f31d1b9290050ab71b1d5fa88b91219662df3dcab04df4451040697bc9daf285ac90947e7408f0d1940e2268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe5917f83d98112af9b4b3dd9553d70
SHA13ccc64b64d7e91458aac1c1fbd0c90018bf5789c
SHA256a97558ca8533da0a2cbb5b27bf8c5e160ba0d9de4f6e52d8095189fa1757ae86
SHA51216154c89bf8fdece9b1da67d689a3fe70df6dc9122aacdb3b0be1f713684f274d6e9467bde45d2e951122c3ea56d478e77d812efcc64efa1c211e824d8c61d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8a2216266888c22751e3affb05dcde
SHA1ae4f2e1621006c642a93aa06c7ed62d6d0b3d169
SHA256910b503f38ec42961f39e33fc078db84f22395f593446cae55386f77ae780990
SHA51299f60f561ae38079ccc4c2f03380b99bbc9e0ead6036f5637e544c006707c0f6ef59a123c2bf057d76be886876d130b2d208ba24ebfc98ea03341051b9a98804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52998576a9e35c1e54f9ff3293f21a5f9
SHA14adb53cd83ab37edda8a8f4785778e284a5e22d4
SHA2569391d0e5b99928cfa766bb9bb0cb2a3513d59a153a534a1bafc96a0a75b04b9d
SHA5122e8262cc7dab2b3443e5528b338a86b8e3d0b16d73ed9c23f9efcca517eeb5f7527d97ad3698c64779b6c49c72e83c7817820b8161979ec61e1e762a05b29012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ff7b443d5953d823483fd2400bcb3da
SHA1c0603101ab51581b3abb907c505129a2242b9865
SHA2569bb834c4fb3c547a9c552306ac04082fa3809e5c99c8c6b62c2e06cc47b6037e
SHA512b9ff64ba5af49f758f96de9d3c877631a81f548510ef44edf0fd9b61bacfcdf2e9e13a5e40335eebc7b27db189eaed6ce775185b748eb0176bb412287aa44efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5392e39c084951489db770b355e8affc3
SHA106fed34cdd550b5dd7ba6a8cc8672ffab07b3476
SHA25653f726c5477c55bf333607f11461a21ea34bc1a04c8636aa0d9836dc73a12625
SHA512c39bf86969a315d9da67bbd09f1cb8de7be91723990be80d17e076c8ccbee1ea3e37ed532b435c3a00a46d14c447e824b0d9380f24de535a36f0d7cd3ead3609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634e4d6c7d5f461e98617624daa52a53
SHA116e5b8b3b84f148be4bb392f8796dd975cef47a6
SHA2562b88f4304f4ca4721bcba66ca68d9e81cbc7d9c0741b56b93850d58b4fa8872d
SHA5126eea45828452ad361343221d60d1f4614a26433a787fa78309adc5ec0adcaa52ce44adb071d6409ccd49c59dbfbfc9e3edd6c9e57d3843e3f8edbcb0a900994a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e594efe6dcd6b7143540d526de6bbe19
SHA111bd66d82112ffe5b01ab1fadf371fcdc20cf2fa
SHA2563b25985b9cb0669f0bc3cd83725e7241f8ffada511cdb85d75ae8d62ca262136
SHA5129a6aeb382a5eef44740e99672f0debe2837c77965356117f2e85f2197b9bd1da41540de51a21aee8dea2bd4307e97578b5ab5d551f17f4f0194398c58cec2050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d6aa685654d506924495a200c5a8ba
SHA1bcf35b8dbcc78db2400ea5e5e7fead60337652b9
SHA256262aa59733bdb809d9a9780da144e1862705b93fcfad04a4441f9346168ef83c
SHA51267375329fa483e4f25e7364320ecbfb3a8b0d50cc7d07c890e7949374f415978c2c8d88e0a796f59ff3ca61c76781d6e5b6d9888eb4c1788e943ba46338af03e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5085b8a757326cd43c7755e8905cd545b
SHA14f1307a7cf8883527e7a6f7385ee1a8e0eff40b0
SHA2569e2c7bab0817fe663658ba8b5797056fe3f77d05f541107baf6b2e1cfe7e2810
SHA5125143aca5ba7abe86a87e7c7bfe905ff4fc96c5aef5538db4c1dce1d1ba58dc03c5d34eabd5b35ff258083a7cb87b0dd0f8b457191a2b1fff3caba12e76392c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c06bc34475c48aa73e19665d50a6c6e8
SHA1006b1e02d8669954f6b7334f4ec6711e82e01948
SHA256803b345ab35bfa989d804c9abcc7fa14f0e7c44464f03b09dedfad99dae6f098
SHA5124253082804be0c8f91fcee26334a3bc7e858d9007395e271c07f073d96efa73ab7c6a3ce34b80ea23120aff9267a4aab652da4471e3d7fc8762256a9a81303da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ed0c1cce368024f88ff40ca6e443ad9
SHA1cc999f477170d54f77bddf53c8c3bf6c59a1c882
SHA256c8789f0b81c26b506c6c6a9743b7473b544291a47db5cdc9f66efac13cae89ed
SHA51200ee725b23b3010a7dd52ae881f05a8c0d07839e9066b23d165b195a7a17fc64c6931466ae78d4e453f0e228654a1103c83ce0e919d621c090becfb48f7bac12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517781178def76227474179205807cc08
SHA1c5da8895d46a03ff3882d0d9e962aad719e0eb68
SHA25687606296a0f25f32bc116a98ef73967d39fdaf5aed5118b0d8d2e58e97274342
SHA512b36208d8122defbe6026dbdf7554346ab01093702b3c96fb452e9faaa690a736b3927945adf05e3b8ac218d1d00648a7582657863bfd246739b0d895c94c30cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e09cee24f4fa0616d901b0ccd2233d5
SHA14cb1907dcc023330c3f67fc012ccfb6b3bc1222f
SHA25600d4c32fa24c9ffb6f33ca36be7e91c98d4039e8c962f4c304a563367b118cf0
SHA51226e7d4ee6fd67cff119816a9c1570b9b78327a2ddbfd0cc701a3ef90e2e36d35c94e63c597b502c0c9fbe03fd14c0470f18ca9a5d5a4ab0223db6b1e6ec02015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d19ff0e7dd313757c4491e68ca1281d
SHA1102bf5eda7a1968b378c53ed501cb08ebe5f42e0
SHA2562b41f021d82e2482912c6e47a6230141d4f53401d133493304b1bf5537ca3a0a
SHA512c121d870f61b06112a252ccd47ead959d160154d1463e130ec7526a639f276e246e7304d065671c4fcf5d9fad2f009c7c35f2d8b8e5d0d28b8a2ab8d38f5a46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d0201f515c38c81938b512c69cfff2d
SHA1c93f3dc5fffa27f9efe00f5683c9841ad0e9c59f
SHA2564076ad7fe88ec22c520d794606cf6eca9d8d15092efd8181e31864bacd27905c
SHA512d0573f1e51a515603ebeaa05c3d75e008c5dbfc0d047eafce0c996ff9dad3d4904a2aff06b0bb31c93b6e2b9a6f0c512e8ee2e336b7489d42f2bb5addf190cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b92f1ab8ba06698d06eeab5aa01a8d
SHA18013b9cd5caa86595ee32b148e4f3d5791d8d4cf
SHA256b8977c82a76e8bea778b93fbdc9a0fb3e9f29f73e76c88e7a1dcb9d3066a3d94
SHA512bf39fbec5f0d1dc9b2cbaae5b27d96c5642a17b704b1cfa11eab60887dc6a52898ac1c28c6d706e9e0aa4db326e75268d9b707bc31704d954f00e751bdb285f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677f66c7b8e94554cd87b996095fda62
SHA18830da71f53e3795166377fb64a40960f19575f9
SHA2566a4b9b6367912aa90a02989b6515911a13f9c67623e1bb293da5ca28eae81fa8
SHA5128f85f7402abe1893f3058b2d46760a7b1464d06d2e4f65bde1553e5d55a3d9f8feea5883a9352a5ba56c1462074a8188814cff3ca07e058d377233ad77e1073f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b