Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
d5f2ef3124fd61ba722e61e7a03ff524_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5f2ef3124fd61ba722e61e7a03ff524_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5f2ef3124fd61ba722e61e7a03ff524_JaffaCakes118.html
-
Size
11KB
-
MD5
d5f2ef3124fd61ba722e61e7a03ff524
-
SHA1
376bee1e44e520c5241df5bb520abb4d027f871b
-
SHA256
0f9ed8caa277e1e3d68dc024e6a5ec563f653d722c24bdb5fb641fc78d03a659
-
SHA512
bdbb418352b26afdf6aa182d8795a7f8598f85bb34ed003ef0b0bea900ebcc214313792f14e54ea7a94bda4fbc419f78304bda1add5d2dcd0b62e4b9e65f6a44
-
SSDEEP
192:f1QVUVqt1/kJrxvuiDOflWRleGWR/DceRbjmAA3crLUmN4tv8GwD8u2u0pVvoK1Z:f1QVUVqt1yxvuiqf4RleGW9fjM3SLQt9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{33595161-6E85-11EF-8C8A-62CAC36041A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0dbd4089202db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432032251" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008de4d4536028d7e8bdaa181a1a898f8f6151407ff90aa766d8e1eb40b8dc61f6000000000e80000000020000200000006aeb41e49f177cbee7bb2f79356346f417f46577e743f1778347a5fc11262003200000001e8dda3a02d3906ca20136518aad3e8c86ea1d06b69d1fbbc7dccb9f0d157a594000000036d44ec0a0cd1eceb83f4fa2430d6ec78398ce6f01bffd46ed2751e252de69a8bdf7d88e1f70cf7b9fbbaa72e3bfd844d6c20642bcabb6519a88bfe1c7fcce27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004fb70662740bd2df234ead7fbd328dfe4f35790910dd9c9ea3313443f382b2bf000000000e800000000200002000000010df9509d6c732c6af497c7ad43c15934e88e989b89e3fd1120719fdb9b5f595900000003389941a9d72625950ca4b4db691b3dc61da47ed8274cb55f6d0feeb35f543a2023627c85c6ac2b3bf75cd0c9bbfdb24af04ab7f253e977120f23bba52e19c64da9aaef83b056cae63f0d0808df2f243805e39cf01d6e5715fb22fd35bb474c0c6e42605e07df90cbd0b5c0802aa1eb7afbb8590a5cd82e961fcabbb0309bbfaaff2becc1b6231abcace97116c3809d4400000004516fbb4f17f15b7db38ab688c3cfe9ce21ca11cb9b4bc3bf83e6e21aa277b560518b3df77165e7e2ce85bbe82d6a7967f6f5e65e1add7f91e669575f8e8fdb4 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2660 2652 iexplore.exe 30 PID 2652 wrote to memory of 2660 2652 iexplore.exe 30 PID 2652 wrote to memory of 2660 2652 iexplore.exe 30 PID 2652 wrote to memory of 2660 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d5f2ef3124fd61ba722e61e7a03ff524_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4dddceb6b648fa3bd14e5b7d1ba7a0b
SHA118c426532f27f564b3b5c6782cf0a9da74c98da0
SHA256a1e1bc1bfecc70f876cead0ed8ba2c5d9ffcb128386d9b5746ae7bd2db058de4
SHA512071d776b5b5074e9b1978d0922f8c8a29660df211dcf51c55b401b99e45677b656d04327cabac31d207f75464533c46bbe2bf899b3e86755dce076be50b7d1ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567db36ac10b10c0fb053ff5e80103179
SHA1b7e9c23643602840a8c12152cc5a0030153e3503
SHA2561ff14a94b062a8dd0c6f5a674992e6a30482baaac356d48f2cac08ea1f904d51
SHA5129990685a518bba59f12fa6d2e11fa7e3edbc5319f5cad94a0ab9e88e4fbf5455b7a4604cdd559abee635f9ebbaf24c37ab1a625a02532f8b27e548d9522f5b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad546a7d44d3f8586b4171be46c9b627
SHA19ef794b2b4a27557cedfe0544cfda363fead1096
SHA2565e085d5b161f270d91dd9c721989d1ae0be0676c366121d94d5fa88c38f4a69f
SHA512d489ca60a8a007e0ca0278f86238bdeb5e7c4290fb1c4754531ae40a372330d7f714179ce4b7cdf7659cc1c8026e33d415368641a5a7711da7be1d9a006ac00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330041fbf24f05e1be80c4a1f9d0e610
SHA137d35c653e6c35147dcb1c848439d72911d6ddd3
SHA2569c0e6849ae3078e8d846761626456eb904613ae41edd48b80ce0857951b625ba
SHA51237797d2bb48022d4673ab42ab9a14f351daac203ad6595112f6c3d4e48d447e3a51c8b0e5b7b92cd8f630f76a8bf9e15a8ba0ed71903cf292461fe79a70da726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54158ad2916327a475c3804b34d0cf269
SHA144b7604e4fde025e170dc9d2bd59ddd5a0d70925
SHA256cfbacc697ea76bb24b28090058a98cdb5100b277ebd522ebca30b245a7f21877
SHA512582137b8c6c0be5c4134e7548f36f6ca6ff86583969b2b67473f959a8cff50a9dde65302526772ddded8ef77cb18dfb0a47b13fda94c65ed1e80ca587be17541
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54b184c23403ed9fb27d8a2e8156d20
SHA191d487a22b49459a5ec8fdb0aa85574708dc4732
SHA25612f56588555bb03060b1ed9c81d14bebfe8b42abc11bd7b7c1f875d9d9bf56ba
SHA512918d0ebfdeca74fbd49617e1c8b9eecb5876f7108b2a894f74a196ae6e6295eccf99478d1a33317fd7a771562e1872fbaf0c2b91b005a832a6e0d4d9c672320c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c555c55cb6871fc7b42ca7df06f4d170
SHA14a26bb862d81ba4fd880d07de44345b9dce8d342
SHA2565e51940f6df5c440af226488d1e002ca9e5f4f16883abc0a30a1a70f22c36a14
SHA512edca7b12b4548a7550fec5fba9fe7640a10e32d6b157874c1075661bbe5322e437fb2df8d80c49c71555c5a71434b750c2a323e7edf080a3249c4d4374e826e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe5f35c1a6b78e0ab5daf11ebe2a82b
SHA160823f61a124c8c042ae5ff1c4f204f3b2da8c2b
SHA2564ebfb0b99bae088390a8033f5e8bb95fee20b6e994af347c2079025c5fbeafa2
SHA5121e99113bbb5fb7cb9c1c0eb552a09608a18ac989baa0a2098a56c773a98d09aa36f466b710cbe6b73f0819ca076002492067af2170d0ffbda1ac698fb8209956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8b8ec9dadcb88a56a25eb86579bb2e
SHA125293bcf4340fc6dcba826a5617e13b926fdb6be
SHA2567c1e9c4f58dc4a91a4e8b13e71dcf43b0e720df220e63936f682894907bc5162
SHA5121a720b2d3ec96d098d1d1194b3d9fd42192f8d0231dc3270243f54953d9ab93c34b5818e9406a8e9a6a6729ac03dc336dd122cfd84e79405ed55228239eefa70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543f142d06cccaddad29c74dc5ede318
SHA1eb9020516adbef8fdc312ab78af0658f14451579
SHA25619525c5844eec0d3cabff53ff0e0740d94b353cd2b0a4ae17bb0236f8339348a
SHA512d1364ce79214aa720c703e6c96dd49ab33cae24a900f36bc99926cf45308eef1118fee6f439e9378d66f2d39e2f8fe754c62783eb67ae739b02f80231c4fde4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d977a319e4dd5e16bdc2627c93e3029c
SHA14b61d5b0d91feb542e2f8724751a6a34681dc6d4
SHA25646e5b297dd4ad2de40a06377ea80c48d92a693ba738ee966c5074cc313ca4eb3
SHA5123ae45a751c3dfdbbaa7ed08d9a9b61105f70edb12252ab11d972c283b7bcbf3cd294549387336355b4e634135655be5591464d73af67991f08406dde4986306e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd843ad48209205de172bfa4c77323a
SHA17accca685254f33ccba91908fdd531baaf6f19c3
SHA256c14ca4b1141f920fa172a7ce9f51823cceafb52c0be2715e87e360c356f95c9e
SHA5122b0f32fefb3585fd8125205ce89da0c7347cdb840f01df899eede7c7d56919e50bece1b6569d18b2696d6a5add231edb711306c80edf957f38891a07303eacf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2dbc02e0e372c949efc8151653ea6ab
SHA17f1f4a412e024ed929a53cdde691b78bcd03e7a1
SHA2566843d962fe0151e64b7858b6731e664c3f97b4ac1cfd9dc7868626011a25e203
SHA512ff4683e66bcd9c7d1618676478428ee407793bbb2753f15667469e8d2b7829ed059610004e0447974e0fd38fbfece866e344b8defa5dea6f47f9158ab5dbda60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561bca54b24bdd41000754ab70d9bb733
SHA13e2fc0b6597e0f64f5f035e941160f7c01d8deb9
SHA256c94022ff8f85409d9fd24dfd34b480870788be389333631717da07cbea550851
SHA512900b0353c285e89623eb1d821992c066465c1985d5ddc6e34e1f6b3d7ae60703d9a01b2e3c31a43416bf6f1a010452f24992eda55992184e960bbc6a4219e8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54880f280ed38ca34eca1ca65dc09ec54
SHA1e90a63b5a44508ad6e8708148110df593d51fc58
SHA25684bbe49771df6a669e9496c1df2d4e847c70655ce5ea2bd2ca0abd08d07668f3
SHA51268d0ab435f4fffbace1ac56fe1490c00cabe2fa20dfa8c66d24130d50401380baf1b1122ed92219df98c661d789eed9b028ba7f378822f71d0af3de9e38597e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cdce328db1821a82804293356558f14
SHA1edf6f847ee8ed075802655008af7e8039e09f11d
SHA256824fd5ed455eb38f24b9f5dc74e058d5767eb39e28a6cce341dcd9f98d618393
SHA512a99ec78fbd00409611de353edcb33cc22300b02910e5dcc372724ec277238003bbe479da1d1c2e1e86e47d99e75a6f807ff0419f71dfabf2fcd2d8956b1c6d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506669372b2c968e7bc29f370a33174a4
SHA1ff53e4edf1d692ad694ce88a2bdab5e87809d875
SHA256eed2d6cb4303727f0cf830d40c78d2077cff963d28d56cae2de7ba12614c96dd
SHA512c7bd4c4da27cbeaf98372af2b84c48b82830c45521d21b9b0b6163952dd97dd9100fb35f02e840dfb43b3860a93a351c3b02efb3ec307bdb1bfcb5e33ae4a9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5292bfed2afe5bfc0a72a9aabfd96c
SHA117ad09acb1c60857c23bc7511289940e2114f434
SHA25656eb47f320465d46239b51f48380fd5c788bee2f8e3bdd373b6d91010859e6f1
SHA512e5812130a5e2ff17342c40a4f9ed74febcee0a4c56dc5ebeed223d634be732f61d24a29ec98581612bd10032e5d803489afc2edfd8f5f36120ec8cbf99a0c72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298f7f4d9e771b2c6e4947321a914a89
SHA191e32e11320e8e93a980e83ccccdcedcf8aa78d4
SHA2568e0a28fd02a3ba7cc15ea5c27578ad9e612065ea85b76f9cc8b246801e7cdd32
SHA5120fd870f9dde985be6e7fc3df5e1517a657b1a7c441dd9b348b6f6c3da6b60204f49a88d84014e66a1ab740b8cb6718e4b9e476b7bc8405cebeb6faeee05bef62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f92ee765de167cff687be61e7b8a9f0
SHA1f992fbfe93bb4ee709a2aab1773586317f12c7ce
SHA256fa4af3d6765c74c99a6af6adbdb06e206bc392e289b023655c04b3c9cc0ac91a
SHA5125133c78a847ac3bc2f84933bbd3dd265249b9b2259627b1ca3d75925232cb7cbcfad416ada463776e64013a914cb4539dce6a9857dbe816d37783f65639bffea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b