Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
de0a1262dddcab96a5dc0616be44b1ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de0a1262dddcab96a5dc0616be44b1ae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de0a1262dddcab96a5dc0616be44b1ae_JaffaCakes118.html
-
Size
31KB
-
MD5
de0a1262dddcab96a5dc0616be44b1ae
-
SHA1
1ff71d85d5b87baabe64e620b76c1207becb276c
-
SHA256
4c78b09d22415212153645e31022b0075c9efaced765d0abc40cfcc960b78227
-
SHA512
ebfd0d0c3be4e2020378363b0ed52e7eaa198c2234850a5398f946763f0b333dc4a1a9f0ad2171d9e46873591f1b941a26fcbf1642c949fbd49f4cfd5ef992b7
-
SSDEEP
384:ACk3GDG7GaGNG9qG8GtpQ/MuKWSXSQ/jkj:ACk3GDG7GaGNGQG8GtTup
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC49EB91-71A8-11EF-B25F-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007feab9a9cb63b46ea44c55edde4a8f3fcdaffe5d047175de8783e38a0b0a4bd5000000000e80000000020000200000008cbb7f6bff5855b826f06a5d97e97ee93d1bff4432ac39e06cc80a2289b986fd20000000980d4e1bb24359843aead248ba79127814dfea6632e2550854c6113b27d1c99540000000a13b234c1980833a05833592a0b3c12e6388c5d433c9f79015de3fb0f6d78c1b2f2235fb4f5b057d771c21b3a1f373b9d084534b8439c604c4c08c7ff1f4dee7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432377475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e6a7d2b505db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000bea8d136ce4e2c28b1ae1af73535091b094b24ff7f22de95cf7ffbae585a7a8b000000000e80000000020000200000000dfc3d26fce7f9bdf1dd6a2b01d6057b1c1a8ba4964144e2347282b178fa89fd90000000121f2bc98e6e802795e00cb63c4af5d3cb9980b0273c16972c3609467a504200b8216d8098c60b6acea6754c63ea162468902772543cf7a9b5514ccd02104a5ce813c2341cb9101646c273c0da9aa7464d797dec5d856d2b5eae35c80dd2a62316bb03fd7c90a5611aabbae82dbd80fe66f5254f369f321d38e009133fa3794b30374d6b37b309eae968bfc78836f98c40000000b643cb1b32b94474501853935d191333ee3e2b2f8a6aaa5a78fb20917c64b94cded0cd9f6ace2379bf3b95fb8b732f5619b04147daa66472039bb52ff2287e5e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2328 iexplore.exe 2328 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 1992 2328 iexplore.exe 30 PID 2328 wrote to memory of 1992 2328 iexplore.exe 30 PID 2328 wrote to memory of 1992 2328 iexplore.exe 30 PID 2328 wrote to memory of 1992 2328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de0a1262dddcab96a5dc0616be44b1ae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6041d0f5c021d90c0e6c5c615360da
SHA1cbeba9f61f7945f4d20fea62672a8facb7477c11
SHA2560e037a3493e28febf95c41f27f1c28e3cff2acedf64f17c05b0bde3c81df0582
SHA5129c84e2d9f44e1fe16d049e3bcf6f22ff90b83dc61b6eb9c33f04b77cd27dd8a72453dab0df4843fd70a5da98e1f434c16736d2e55fbea73a4ea9d8910ddbf1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a29553f3e732251efcba73a43f6dd7a6
SHA1cede6ea6a736236f29599303a0402e8fa7284f34
SHA25644255ff0faed5704d858360861b447bbe6d3fdf2e5dc1ab227ea3f958e532089
SHA5125807e446df1d2e7e9f68b2790f59098edec3711db9cc723241556388de317912c180861915fa3be164b7f6e3ecc662ed17a77599ac32e877be5c3991d5196228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fea725ec70028904ea00c1214788048
SHA1dced671991121727c89ce07e1e4804ac8ee0028b
SHA2562338ae1bcfe5d0975963ace837c49b0c9d4d8d384403c91cdbebd617bbed8865
SHA5121f7a35e3303da05dabb05a3349fadf616c45a97da518cd76e8fe2d3e28e4db82541f30c116912c2d64bcdfb7da02822d73361b8a3d9678472f2c8d40d725e0ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0da6ee2146dd79613435d74c46613c5
SHA1b90625aef3e3eda369291380ae7b6569aa17ecab
SHA2561eaacbaf51d7561a44e601e1a7e4ce3a667eb94d42cd9450ba8f042f61fcf2a6
SHA512f949ac6553cb81cfec3ffaeb24e79bd1ef9380831e71fae518e37444878a6c016fbe7177c25ef9b2f08da725439c96d90320ca7b2c449ec18a0e5c54b958d85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40795354ca8332cdf775271774d0994
SHA12b71c6af0b331f20f43d75a745e36649855bd7c4
SHA256d062cf85d4889b9937c5ed2123e0f48505249b29ba32f393a12ed98e2a0dd0a2
SHA512fec5f2f601380ad33b9ec4ee284c751df87f0d9d7cd43682ec39dc21c3e13568b31d6afc3dc872689525be831c9d861f46cfef6a66b7935fa8923661976051fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f116a6431d73eba5f6132444a6393117
SHA1407456d51b135f3025cbc4b9116ebbab248a85b7
SHA25659482bc56abb8931f165d99fbe678298b27ef850861771b277cf961ffd98b170
SHA512c42c682bb6d99f4ec3a75061e182362f01b59d08a68c17e071f78c7f42fd8ded5683aa32b2b4be0eb9ba85bb848890dd0ba933364d7d7173ab7b4760ff0e3a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccee47b0fbfad5562481032efe68397
SHA16319c123e70a3f903ca2c82a12607cb50bf446f1
SHA2560ca10eeaac0b6ec5e538c7de1b58f2bb7bcb6cdf7cb605b6cb57dc32a7966306
SHA51293ce2757cf55f87e1951480bc4dc74834ab5ac5481c4d6899a409d25a4e2a5c0f1650522ee0ca5b9b93b5de128b4ea1f0170f85c22f97fcf09a9e515b6016a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533655f75c621db2836d4b3333c9234ff
SHA192ce89e209f422ff1fbc9d3732e5bc8de49b6d15
SHA256a016083259354a57c43f3dad16cc86d00b1840561dcd3dd3077497e029378569
SHA51271f804cf8d17495048c60bc60f2ddad0f0638b908ec46ea11f511ee37a4a79bbb1c26949b83df77e6ae21cc157f2c7640be9a2c3879d7d4c3dd48d127f2ed363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52baf2ff52497745985059c38eb7f4e63
SHA17685422a26e5e6204f8eabd519d3d9302dcf6926
SHA256758240295c53255f3b8dc4eba25edaa4dfca895daaa596e08f839ddb3f65180b
SHA5127bf178a26baa3f7b6c4bffee08c2d5b4714d8be313e7c02ee32121b308563d1fc0de36df3ca6d208b468f58eff158d263174f77f2093524e5c029e2723a1255d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525fca8b7eec84f6f24c3c4d9ad791b7c
SHA133a72558c084052c6b8b1ff32b330777e5247abb
SHA256f1e864b074dc25d9ef305429fdd93458e9694bbda6d1cd6ca557fc666e246c2b
SHA5123fcca0f8964f483f4ef47fd108190a7afc6e0fe505b9d6e8c169aaf810a5b17e8905e4350ba5868900cd3e344e64a73e57c3b18c6d6e7af27e047e4fa30a847b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568b4b2c6addd2d2fce162f713e8011db
SHA1909f4c8fb59f13905e7fac517eef450599ed3964
SHA256a5df48dc8c173b81065340c8ca30db9de00b11abbc237901abd5d5e65c065dfd
SHA5126a8afd806f164e6234cf4b3ab2671d2a3d972f116782a01534534959fd3dd0b5e19104e5e7c9eb40e28a4025312389d49f74fe46d015e21da18b0e02bf9ec38a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879be68d4122c7bf524f2f46c34d2fcf
SHA1a7d0e3f0accfc69837f31a44fb9929bee7e05aa6
SHA25601a785d0e11538d70d8b428b646444ef00aae52e3332679329e881ee241dd99c
SHA5129bf693067d18910b7187364951872e0803d4e8b688840dfec8446cd19afa4aafeaf0b04555fe6a885be9ec2970b0d0a6d712d417e23c95b0c89507ec3040097e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f1e0bb3f69e546eaa70d333c0ae765
SHA1ad3122c7e1ba5f6dc22ff615ae7954a13fade661
SHA2565d8f1e6747cd3b22f83385721ee0cbb5d3aaa92342c3ea231df814b70bd7a73c
SHA5129cd65066cdd6e93c9badc8d686b08e025f0c8f56bce0584d83368199fa5c0902538da172bfd01e11eff67ca570dcd7c99e79ed108aec99423d3a2a7858740bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a72b3fd1bf4bd100b219e3ec858e97
SHA1f591cc30a02cbfb5cac42d3ec99bb37c51d7a7b1
SHA256f4ebde4fbf0c0e9b6127bdf620e1abd561f5660459598af5de2972a1214e01a7
SHA512f4b0233b67aae9893d0a00bec3c8a4bc7ba29fa1bc0d51d8bd0ef5524765bdf352f3282a90fe1f9afdc14600b51db6b429416cab70ddc24b1295642377344f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0bb6c2f2b149cc14819b8b27788047
SHA1c9bfd00e122aeb99dc8334cc8e6897eba7d60a55
SHA256ee12a4e8962f34083a367b2591d6e7b808f3af79b71cd3b3a2c259af9c22af10
SHA512a1ff792827fa53224c5bf29d40d9454f77a88bae8389935fe2731280cca39fcbb6bb484d24bd525291463b6230c0b4a4675012bcab572a988fb962091821059f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55188380122e401c93db944807067e3ef
SHA1e489fd4459578c533bb7ff646a18b187c835002d
SHA2569c5f2d975c2afa1be20c1e317ee90ab25786a3ff255a7b1343fcc566e1855062
SHA5124eb26947a927f5f067328a2794f26d9578eb28f1eb0313b33d1899eb51d7b49e4a23d88aa3db4aba4b85e16fbbbb5679f6688fbe1c2efe80d5f83a65ea2be3c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abbd9e1b74de4e8a48f778ed16a1c2f1
SHA1c1f9172e4ddba0b0a48a9b36a4889b4cf6fc939d
SHA256c2dd8962b0cb6ef79b4f442c09fe0d9c50104f58c361181742f315f97387a1d7
SHA51251904f4066abecad344c45ce509f587006abf4dbe401132634a64d44f15d0be19bd339765da374f7067869151125c38b707de40979aa43685fad9fc8d801e232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a70884444e39b739bd14ea4823e8b83
SHA1666bc417784e9efbecc674d245e7fba986da0dec
SHA256685193ef258b6c4c883bb3b676354bb573f92a1a5923be3b20156048c91db336
SHA512db517f0009d6ad3211bfe995bf1d9538651d6567811f1fdc657221686decb9a0ca78fa0c35ee59115aaa5a3fa82aec7aa8db303667c928cf27728bd66c81a785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54385ad582dc30092b277f3a8cc412803
SHA17c631dd08f956bad09df9dd0ef7fcbe96f78df3d
SHA256220d676227411057e0f98b652cfa99e53017fe791910c5deb5c70d564e109fbe
SHA5123dd72c53052df369685259c9fa5316b3debb3857d011987b5fb1bb2e166ffd5f7ed404a56ea3c52a30ad715134474453d859e946476e5e10abd18988564f89f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b