Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
d9df0e1d142441e7c450ec48c15e8497_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9df0e1d142441e7c450ec48c15e8497_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9df0e1d142441e7c450ec48c15e8497_JaffaCakes118.html
-
Size
22KB
-
MD5
d9df0e1d142441e7c450ec48c15e8497
-
SHA1
893787126c9a49dd2d25ead03564454614bcb9bd
-
SHA256
35fa9ed90940896118dc410b65366e8757856d5bb111c7ce7393b0e398a5b7cb
-
SHA512
737dcc945e9046da49250fe9e182aaaf86e0aabbd083199ea54b4faf47db21c14cb9a6f2a612df5e461dee2abc7e471ad1119f07c9e7856af2c741da64b8935b
-
SSDEEP
192:uwq9zMP0/i0aDb5nVIxLRNKAaiGlYMBnQjxn5Q/b3nQieHSNncYknQOkEntpr4oj:EQ/dv06kMm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b14d39453c0011358094d57577282ef74b180e1d6c2172afccb57761b1860d3d000000000e8000000002000020000000e2895c55892d5bef2f56a8a79f43c791f9550b818306ddb01018dd25f893fc8290000000602586b8fd11fda163ea65d8b39e87f99b04734210ca27808374e79b296a1d6836e87a6a00e70c63fa99b77faae1108e6f5c05133c54aa8ffd5a6dd9d18ca2c9187f7315f81fe4f008d455a3ebcba05f2fd96eea9fbd92ddc0d0d04ff42218d9507904ccb2b4cc903d6aff0ce75ffdd8e77e1ea6247414a96289536a70ffa155b5b81212f747bb1b8b329ff91c49ca464000000019af680426ed85751fd2b96ee0547d3d90d20e3722f0627a1ae273f1d14348fe66cdfc129b14dbfe3fc14557ecc731ee9e0d610d8f26b46235f80f5e85a4effb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432201460" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bd37001c04db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29FEAF81-700F-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000cdd46aa1281caf422eb3b8481427504de7bd70ff56fcd710f9202f5a443fb032000000000e8000000002000020000000d5d2b9b9f4ddc3fcf65417ac36ed0b9abfd38e4caa2eff488c7164e6a9fce3532000000007f384cd728be8e6d1f7723d28bf281cd120bb7f9b8089773b89b33559d43d36400000005f1bc837152f71bd17727fce3bf1ea4e17f33a6c72ae4d348bddd576b4de57ba2380e25d915ec7ef787bdc5600d6f5c8f161e5bd20da4064ee55014aef33209f iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3056 2484 iexplore.exe 31 PID 2484 wrote to memory of 3056 2484 iexplore.exe 31 PID 2484 wrote to memory of 3056 2484 iexplore.exe 31 PID 2484 wrote to memory of 3056 2484 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9df0e1d142441e7c450ec48c15e8497_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516825d9fcb7bb66e1a05013068710102
SHA1582e65497923d9a0db3464e451d82efc22ee5964
SHA2562970a3b0a271029771c6ff36ee1c72b15ee1a5e63ebd739bbabadeb1a82cd174
SHA512a63d6758273646c55b333a8cc4e2739401e6a4506a50ec84768a2df9508429a97a644dd80a10c3e716cfd145c1b57973f125d46de8e9225c3981fb49309abbad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d625fca0313982af98fb1c98b939c70
SHA1719f4f8dc52ac37815d47c91721f6d0d7b8577e1
SHA2565e65154e59d3551b7097bcc0ab5688262627a544376f26a8c95b663abc1efad6
SHA512ffd93094fffb478b70cbf7b444c465e3a1a8960524d3da903ae3a5300902280e313df03cf2f4217d4bf2adb7364760262957265bbd6448ebf5133bd505bbf3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafc271780c5c7db29b5a05874ba07fa
SHA1ca1b4e040c2755f9991afbcd8b1d356796387c98
SHA256f8b6c03ca8577576703abd4c37addb9dd3d5fd12f2ffc7cd5aba8b3c04271c27
SHA51298fc2de6c6275debe7c844f2d58bcc4d41e3e5e23421f57dd8a1e9508d274909c248af19654178007144ca19b1eadc1383197eb5ff790255fc066bf351288468
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5335cac4de221fdb2bb54bbe5f3dfd
SHA14833243292619a367505169d86ed8312ee768ccd
SHA256fb9341698e91f68ea0122cc0a93043c6c6737baa228c13012aab7690870334ae
SHA51204194f016683e788d7ed3444904b0c697934dd2de9cde72ab1357d6a0547ab7e57d941fb7a78e6fe1f4a80efa0784219cfa744c70cb0c9998f346cb59dd08c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72fa2f2beed5b61a64dbe67a304590b
SHA117e9758c5ffa6ad402b5814398fc7e522cfef578
SHA2563ec14e684b95d19b8dfbb02c2eb1145bf143f526b14bfcd675a44cc81e8076ff
SHA512affb2bcf37710df177a0db72919fdfeab69c74be09fcf99bdeaf2b9b280042bc8705861938be6566e635800397a1a562915a4da62846abc496dacc6447b2e088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51939d63de3c89bc6fda0f6f6e8d42af4
SHA1cc9c1246e8ac95f4ac9cfee10f9b50337775019f
SHA2568e7e1086d4dec2daa2dc9491d7e9253927ebe0c744d641338e7e1e8b2a0148a0
SHA51239eb190ef0f9f5b8e20d9a11e5b19cce72c2d4d7185e07a077a95fe396d957ecd2942c44c27bbc69eba49e43cdcdcc97c40fc1708523ddcf4c4b6b2573ef8cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d220918750a85a7df67a2e7093ec1da
SHA13f2122654f0e905c9970b307f3a0f5b400eae186
SHA25604955b74c233a2a19896e2eafba7281f60c68195f2b4c1474fb5ad8c1f9cb81f
SHA5124dcb581caeb3d33b6507c304bf02d27ff17907bc3cc3b8b952b8bab8dcd334410474c2eb778e96af2d2dfab31a4337f8eea7479243d204d440c332b5c9a33073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d620d410cd64d820d1c6efa70e1583
SHA1842e062e2f601288d6f20b1482d42015b3b41edd
SHA256a83dd0f95ce1480b2cabe49e796960b7c4a787e12a001f7d525d32a4bf7c5770
SHA5121f822cdbfcbb8a561c555c0b159ef8a7e63cb51a0865a086a46bd86d727b4a1f26dca2786be416b0c699dd13ace80f669115eea86d33f0d0d3991399a0b6607a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519847dec5b2ff4dc5946ac373e610e8f
SHA11bb60b7aeeee1859d71d5c70768ae6853878254d
SHA256b6a80807bca2c01bc06fb0746dbb40fb1566b365e5a12a0f28c0c5aa0393ab42
SHA5129fee61fb6606f3e3bd72ca57bc1f5be9b67cb71ab2d4d01d58b54d422fea48ced68158c1def16cec4060488727bb2df13dab4aeeb1d97344d5fee034162fdb38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af3dd0c91049e22d22fe6bc496a4c0f5
SHA161bc84fbc19e444825a60392d73246f22eb71fa8
SHA256fc4054f7af62e40efb10ddaae79001d360e899556408c1a3b62869b1e2b37108
SHA512c9a34604d5038fcef5e81584ec569b4d6b209c56d18903e7e59f15a21cb522e4320cacde4d1ea22c18a6e96b2c133831cca427547cf496ecc61f40092a57f0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fd96937d7e915ac8e228376ef69c79
SHA1331e2fbccccffbd4f2ccfa6340346bc17f15b81a
SHA256c4b85afde4731db977b49b23ded343303d43413e728863145dfb49a8c57cc398
SHA5121899eaa23fa39d7191e0197f258138a271982b3a17467de4910534018774e59e1a91e1ed006ce94b77df3d26031c9e3c719c0687c071df89ef6c3279f387cc06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c33fd9440ac7152079be262e0354e9
SHA11606dde34349ffebbb3f415e4dec32b70d433f1c
SHA2560f677269e904dbc6d7ba64bccc1740ced4a2f9cc96566146c1aa269703f78fe5
SHA51236cc326dee961fabec51b90f75f131da4df716d47a74024dea964f6e2ac3e5fb89f1a8f5cdcbbfa179cb252d9ea32f229d34e1f87c8f285dd663e37dc064918b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500c95f02aab6911e986abd2510dc1507
SHA185e88e387bc70c317552b30dd1a1250612665eb1
SHA2566c1e7f7812c6b522fc3c563872ac6e318e5282761f81b8a0b3ed053f30371f1d
SHA512834d7a77bd325e6bf41f772c2f0f723b6a710e11cc3a571979de94e3b78db45e2ce19500f33e4a87b813f01ac5fc742fbd49e744559e78a9b20b626c2905c70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81d55e864cbb45a406c8b27361298e1
SHA1be285af3159bcab685d438f270f67a4824050c66
SHA256bbc312f2c820beb3ea5ca12bc31d07a1687ed237197114faacfe91e5189e17fb
SHA512d8b6ca201cb8a45e61d0c9c915dee282c937025533831c85b19066fc1bcc1203454935a8493c3a3181823638937021ad2793ddc79370ee174c54924f249ae2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d43f0f02d5dea6953c59b61c9846135
SHA1982825859d165170d69122a94628f2fd45799c31
SHA256d1e539ad1f6aab757b9c7c76be162713168d06dc91a2efa7562c21e7bcb79216
SHA512626d1056fce5dd57ca5f6e5293981d4b2fcb5227951ebd3a9ee60123fefc8599363888b52b8df9885b8636842a6b8758997d5506874c141ae2fcfdad00e0edfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552fb6b3ae4123e0f022c00a3005ef383
SHA1f196536303cc179c1020772a2418dda63d94089f
SHA25681b75c2621afa037f571cab90c4fc856d26f71f3896f52db4999f179b5c7b19f
SHA5122ee98355e96031d3e335faeccea8428c1df3585b6edb4f115b12ed01b48f81976bb057602cf4d69fa0fea5a54c77998483764611afbb2e34f066cf25847d593c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429e6ee609ff129d24cd688e82928106
SHA1b37a94d13dda3d8c93e7ce9b57bf6eec985c17cc
SHA2561d9d3d344ba763f275656536614a8e2f09d459823d7e42ab959d7ea46001972d
SHA512146e23f96ed247f816cdb95206a40c473501174e473d39c82697c67465eccb89bc90f3bc4f21c9c65d4bd86f0c2af67f042335ed95c9ac418e0727f01e57c220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e1a1bea0c79bb9fd702f51d07ad3be
SHA11a9c344fbbe7dbd0c7cc8f813a189c1aa5944d64
SHA256ff473829b71be97fc990943634b2009b6808c2118c845afa9c8a849507d27810
SHA51263f5bc8410e77cceccb37918f4e137366ed1967aef43e73360190ea2806e8bd5309e46308e1c6e57b762b4e984c68d80e355cd07a6eaa9d043fe1db46e249bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a222d6a45f992d6889cc0b756f876c6
SHA1dfe5d70a4e7149156ec007e21a68c93c3f40f1d0
SHA256e49e3b5bd2a4539328b2786818bd02329e3d1972856a287a4437e07372e85c97
SHA512bd001611d34906b63db145dd863dd3657041e06431c11ce4c29e90c444692a57995d43400418d9fdb82fabd5a3b549fdb4dc4e47b341f479d8e195d575d8fba6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b