Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html
-
Size
169KB
-
MD5
e9e738c080f4099ef5d587150f15b61a
-
SHA1
f291530601e3988779b6967af87207d44d552e99
-
SHA256
cf113f5a6c69672e25541762529c1727aaa5e09075483978a05c82e3b44a0270
-
SHA512
2c49705803e029bfbdfe97f5c86b75294134470150f4667e4e5d38401d39dd93a7c00e55eef082832662f118750fe36eb1c1a01d1eb878c4bb51625c6b810a08
-
SSDEEP
3072:SD61+AfElyfkMY+BES09JXAnyrZalI+YQ:SD6wAfEQsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ad6426080adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005d491fb74fb25887ee384c99464d5c3c939d8af3d7e4e131f9e7836acccbffb5000000000e8000000002000020000000ea55aaca88b27c242d98ba18b7c6d4ca87113a78a21b09961f3a15e41f13b35290000000eaa9ba82d83d910a7f064189020f3ed2848b436e1435a099fb1968d65db6bbcd80672183c90754e1d2f14bca4b3829b4e5a7b5aa2ed23d59de5eb3d2410253a523ceb753d765dde40e4faa8b6ce13e27792f05ccdae7b46c9bec275e83a51d4cfff917e9115c3bc89b5bc81a99c785aa9382b79213756b8ca5b0436796c163e56d5679140cf1b64da6c4b3b3c49bcaa9400000002abe0f5c746a4551dcf93841f1ed9a8dbcf435c26fed484c8221483290c354ac2b4dace3cc66f5b3f1fd6e69e5caf6dc533923089930f3a8a8a4265857707b80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432852533" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007e9aa55b1ccc9a0084deeccc0d515db09dc83c2581deaa6a94351bad9f8d00f4000000000e80000000020000200000000c3647741598e4acfb47bf32d573e3fc0b63427227485d12e4836251bd0f1a3c200000009cc0ca41db8931eb0d8f9abad61a5e639e494b437450555ad1839ad48fc7bc6940000000f995e83b8d7c0a22255a9a472f566bccb5a23312e0b2cb2e04c0795bfeba044f0482addf5b64fab2fdf23477b3f7cad8dd50f6f9672d54cab9558947cbabd1bc iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10E79BF1-75FB-11EF-8BEB-4E219E925542} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2364 2368 iexplore.exe 30 PID 2368 wrote to memory of 2364 2368 iexplore.exe 30 PID 2368 wrote to memory of 2364 2368 iexplore.exe 30 PID 2368 wrote to memory of 2364 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5649acb3e97da8d561fba08e2a6a36964
SHA19ec593fbd193b8aeac5c116a7e4bf5b52e2f3816
SHA256ee286462d805069ed3122b6d73cdc69545cc4d93e4cd1272ffafd1b5b92580c2
SHA5121246c05d1a5151b0e21066d161e2275c81af3cbc4a6c3f92afcf51ee92853fd85e655b31ee82c414d1a5b9cbe65f957047c87501cc9f6ad08ff8e47cfec96ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec16040bfdca42eec7da2bc91364e14b
SHA1456dff2e7c0164818e07a90a60d6e3c1f4e912ba
SHA2569ccd468bec80fb5e53cf1a02593073d66436ee6ab44f8f25c4dfd2f80ab17880
SHA512d6c2f12cc79c73fbe80566f23af56639480c1040f9f2f794b92b4e2d0719b24936de6ff9c658434875b7166bf1ee2bc4895aeb3be95d239870e730a4627dce86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653c4132ea46089bb7096265936302f2
SHA12ce23d8f9bc5f3dc815d89e7403c5264a786666e
SHA2562a49f25b7f149a3843ca97a5dc225b3b8ae5f9783d628751e819aab6ba7be091
SHA5123fbf412027dd68417cef14199404b486e842171e33ad2235751b60fa1dbe9483bf6f6a895f0376ac62073fbba89be499b342d675aaf1dfc4b206d7ad04afb0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361cd5c56b553f501dcfda16027c948c
SHA1f3cb689a669d00c6c335ba69d27038c2f3b0eb36
SHA25603e7a031c40e32a7a5cb3f0120047742b30852b55e1d073b8d8abbcf6007ce32
SHA512cd7f50d541963620ffffc29984264a6769428c52e9e7cc61aea06692506fe2f2fa9f1d1d237dae13cbd481fbf09fa5cd9ef8fa79c1635beaf61bc0aea2a6f27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc6417e89d95f29da2648dddf7d59c2
SHA19006039ee2f7afb7deb4bbdfed616b6e1bc8cba3
SHA256a2843dd02e6d23acbcd2adb5c96cf0e1c6ba3cec1f3a73feee84093740e7dd9a
SHA512c610127c19aa02a9e76c5a709ec3a4bafb8f3d4ff831ffc1525089b45f9a4dbb92202b6eddbf3c7818253f80555e1692f175b1b4e70752d295cc35cafa6e5a33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ae8bc8c4187ea22bd10c16fdb08750
SHA1be8e46075598f60e27f22c64a23a0d9fb7d7a084
SHA2563a80a2d8c7bfbde2404cc79c2fa9d641bceb409db3449025ad1d084f06978d6f
SHA5127e43c25b7874981acc3305ed2392cbf500bc3897b4505f0bfffd1d512b55586015a61d5eeb6fed82cfaf10ee7df7db8bb17161726754bb1817d5e01671a78d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd91de0cd733e1de267ffe86e968696
SHA12fe8e5e4fffb4f0e48ba1e7eb067184307dfb7df
SHA25615e36f3a0a1410638bd0dfe4846dbe53d241db97beb13ccf149dfcedeed36677
SHA51279e9ea6fb73a810ea2e101875178bd00a8764ce9161a35019de13449f910eb237e0478098bd2d2b167af0241d2ee92772946490da305e7eb98abe5db16fdd6ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ec2c8d1b4b9504d2f8d6a71799d5f1
SHA1e1cd80c3e4a4148899e64a977c51632d67f99261
SHA2568db584d24fa766fa0adf907970c39d0e9661a1b4a7eb11ddff035bd5fbc86ab8
SHA51244b455903ab574c31acf031c065644e9573375eaf2a3a0affea754daed3cb8f9baac45559ab29ddecb4e3e7b8bbc3dd984f43bb39cdde6140014f829d8f3b9fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad49509521006ad138a963b500b6781
SHA17de945ccf2c1bfb63b3f9a328a619e54eea48e42
SHA256c4d175818bee9fef216dbe59a7e2147eddad084fbb12073c6e411f39144b5a8c
SHA5127d010f63537435b5ca8215a24f5c1d7ce6d6bbd3e5c0ae138fd0ca80dc539ad75123832171e875d3fea8b5f714a5705e8333bffe8322fed128bc06f699f6d918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb99802153c0e4825a01ff7e8427cca9
SHA12eb11678aaac500ead2a8bc4439db565259d7b03
SHA2560f266f3fa711e808c0d2f7755c372aa6050014dff59795c61167367760b5ecad
SHA51250bd3220f1bbc7c0e27fa2b198131d59965dd75d9b5a9934c13c2b6d1ce90768691116dee5b0117742d836d4c3652b2f5569784227ef5e6e30155721a54db3cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4078f704c64ca5192576398c44a1367
SHA1edf7553ff2459dadd4e348e1b9e216dc25ad176b
SHA256584f79a8c8144e1d698b22fff930aa252ebcb1c4429a0d7fae36c065e2f6cde2
SHA51260dd1359e4991b93e7cbc690015ceba28be2885855aa71757ee82b5f6533677bbe028efdd91082eb2e20c2e5c974b84f9b5f8d395bcf245dd3595deffa37dd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ab066abbc94797895e57a290547e28f
SHA1be57ddf362fa1dcd64a209f39e3fcac6dc7a3207
SHA256c3ff4b43ead0a6d6101eb819c2456047bfb8866b256aa5355bee403e52ba1624
SHA512bb91742fcc8af32dbd51d354860ed5134619d16611a3f0f6259ce7e7e1fca431b74a62c8c2b4cb5396c90bff5e02eb90fb1b69ee3faf0707da043008d7b15767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4943f9ba90d255c557fa86bda44db7
SHA173c3c0ed8aac75151d969a7086065fe6fea94838
SHA256317f1fbf8ea3ae88b9309f269a5640c39575ee4a3837588381b6620b492ac510
SHA512e05238fe02c9c36d16b5f1c9cfa4e36887b9fe1283b4c06469761e5cfba204c34174938e2299bd37f1da93ae760eb4968205e12f6211ec0cba77cca56b0da152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af0ac30a5aaa76c688b6d375391686c
SHA1ff1808da397551897eadff598601afcb17b58492
SHA256877129158e2267c5523a7a0fb10ef877b6810c822f05d921c5adb5cff470ae01
SHA51246b2d7f1c426b6a8644a714a34f399849d1975cb6853934f74403ece175bce4ab78e70c0801d403e18d4394e6015cd890a23f26c16b7ec2e456b07bed6d63f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517e04f21711df832c8f8ea74341f822e
SHA1e6b76733a8d2d82fd448413454426f31a9551ca6
SHA256ad7847cf7099600f3dbd0b218b3604435253cce05747787f61d93c3d1cd49510
SHA5121ec0662879ea589d6618d748e947e4d94684b635c71749addcd02685d3266f29e171769998e894fc796c0a509ff2ae329053ac2519161019800cad030b40979c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7cc5a05e08c2920b8ca1473aacfeac
SHA1d7078450e735fefff1f53003dbdd9de301ac64cb
SHA256dd430f1e18a4f7f57bca265489c2a3dff5a886dab208fc73b5f42e654f65d402
SHA512a152117452f9d66cc2636f7f5f986c8e3b8880d67a5669d6f82a868ee6155cc6f3134656ef8c38e21afda9d43243fb82f07f11db7965c651682fbbbb248b97d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5587ad9a33f0c23a592b341aafe644df2
SHA1d9a520e2efe119606c7b3eff52312dcfe597fe2f
SHA256e3f6406a945982218dbe828e1be7219b93d90dc5e08a830a965c2fe49f2e575a
SHA512d2eb4bf314bb87505a247b02701d170a4abc487d53213f14001d1e6deecf7de23ff9e342af4e37369f398b7c0dc1462fc855d4ef8736521ec72b7be55c340e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d6830d4495e69dda95dee888d9cb11
SHA1fd959e57711fd9dc2a6303efb4bc015c1b8a9d67
SHA256e8545f814eee0af9a7c30ddd769f1b0407bd2c685efe9803d1966fbfb94931b4
SHA5124cb14fc8cde6ede4378d4fe5bf4daf354e7e9ab3e03e4d7f3a6059fee845bc15557bc5dc90c6f92b5fee814469da1af8eb900280b516c979ff2c17808d62ed98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546cacc5b5778950a4fe7206424d9b9a5
SHA1b2ae8de846e0f960c0f31b83232705de6279988b
SHA256f06b50c021b831635de4ed4f89394fee072516ba6d25814a78c7f186dd0b8b4c
SHA5128cb145861c46d2cea2ebe30b96146c597693a09efb152be6c87b680edea1828d98ef832ed546c4abac4a7b5d8efd493a70f4faaae45ee7b8990b65aef14816cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b