Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
eac6626c374f8388316c9795c3ea3506_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac6626c374f8388316c9795c3ea3506_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac6626c374f8388316c9795c3ea3506_JaffaCakes118.html
-
Size
9KB
-
MD5
eac6626c374f8388316c9795c3ea3506
-
SHA1
2449ff186b80ccc597898581997fdfff01f58e4b
-
SHA256
93f90786e96c49824eed1fe7a831e0fc6894eb91333bfe7b9672d96ca29f1fdc
-
SHA512
ade2dadf994aa566b9b5351ecc7b1a9c4bad06e967e726b2d7d2c36f8bb82956ceced9729d75ed87423e10cc6680264067e9f7ca7e5a00d712188760cbb6885f
-
SSDEEP
96:uzVs+ux7Z0LLY1k9o84d12ef7CSTUBGT/kZypUlVHcEZ7ru7f:csz7Z0AYS/IaUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889782" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80089ba05e0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000015b9960debc33d7de6139246906f25eb3c6e5581e3281039aa21436789296a15000000000e80000000020000200000006f54bc00a571ddea357a3d21dad20106d511df54c0097b575e57baaa66c7a14190000000df5e21ecc72f8ea27b93a8ceab57fdacb1bd1064a93515c03ae956fc534078b8c57137b0e6a927d43bd7ee50dd907e19e8b25374b29d4d8b76c703148cdc6a513a91e5b109337325f6c8d1b5e02b62cf536f7543757b488d87e09818589b94dbdaebc6701c3257c57f64ca668dcf028f7f1dfa6ab0e694b49fcdbdaa8ed04fb89b243df92c893a2820dbdef43e4cd84b40000000c4d39fe0d3f29c5227bda19d4be659acd96c4ef02037651ad8323e4f9ff905630ce55a1bd61b68d6ccc382160d480029307867ccb8220e017e833f18edb9fd61 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBAABE81-7651-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007ebb1d2025eeb3ce03e15ad49e3413f1c328e104169d026ccea44c7c36c9f569000000000e80000000020000200000006d467547bd2f2be2b4db8a14ad9fc797e34d859e6199285481d008395a68a5382000000037fb2696331fc6bcaf9d0e3317d099d094c5a4b1a1480dd1d1cb06ee53448bdc400000006ffc5fb5e36af290ade98dc463930262126f4e7efb4d179baffd331e3a4ae1cc5792606ab0f1ccb1774bfb2b0c8c9725eeaf86a692d089ce0a508d62e83b1872 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2688 2748 iexplore.exe 30 PID 2748 wrote to memory of 2688 2748 iexplore.exe 30 PID 2748 wrote to memory of 2688 2748 iexplore.exe 30 PID 2748 wrote to memory of 2688 2748 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac6626c374f8388316c9795c3ea3506_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e284b05f503097fa4d50e79484c34bde
SHA1e17d6191016211db588d2b8b9a935bf682cc7dee
SHA256cb882791d0ff5ad775816ec93c720b6ab780fb7c48aed2ab0c93b5250aabf090
SHA51258ce2328610d5d5fa79568573b4fc0ca0d07b0b834321a7949a5ecc8081e5c1e2010e716566bc5c679bc80e7cc7c8aa616dc43e7ce37a7def515b2202c5527d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a425b835ef14c5f1db30c667be55e0
SHA13b168a735092db39b6556831c6b719ac8ef65c30
SHA256c42c3ff65e44191264f0211a66e88381218fa78189f7c930a97d57ab08475840
SHA512d343eecd27abfff92b5c3a36ee02b68f04ca4dc997b5c94af95417c8e4252e14981a3415706a47bcbd98324e4e5ce31294e6cdcd750756df198d82d6dbea5395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36a04701c9f45a75cc0eb6f4bb5ed2a
SHA1c850f7a48f41af3c669eb5b72d3e488e9cc5d5ae
SHA2568ff95009dc1fa3acd152f96ec79523004c632c81e729031f685434e848dda8a8
SHA5120fd9df6e5475342b87d71e05a27aa5896c841fec3852ac82d48c6b3381f2b233f794d64d167f4c8c37550f1d25f9a12791a979e0ad7724661337bef99848b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fbc0845c4f8eb0f43a094fb120d4f14
SHA17a99dc7d0501b0d4c5a2e31feb81094476a2779f
SHA256528215db3c1e25dd0c99b294c54610b73710a19cd8ed7857f3be6e2f225fb285
SHA5129d7abb75a74b863e07b82bca16acbb894b616b579a614adce127d870388c7443170aa3e1d16e5dfdf65257ea8873a2edf2255364ba40150c6679655113918f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53278f4479b3500a51eeee7019e3a0f23
SHA17a26c5e5470d6a9ac62c3c40e544b1c38c2a2f34
SHA25644c9f34c646b640e0470bc3b78d98e6280c2bdebf74bd024856c450faa93d569
SHA512f371b1905e77abc69ef342862a4b971ac44c321592e05dd6d39cbc26a91c288e8c0404740cfd2d94ed2ce54641bbefe931a0fc431da91ffb2328e4b6fa4c347e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d6c6f2bcae0021594843597a3f7902
SHA18b04139c0786c13f50e143255ebf243aefa7bac6
SHA256d8dd4594e81f4766a3038d880557a258081c15af97c45ec1e44f1bd86dc640d6
SHA512d82422da83e0eee069bf72abff26cb8cccc61311e277f488fce8544b6bcc4c30f665dcf8c8b8809a454c2fbd8be5ad4f99475a0f9e826c1f8cc857721f4408cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d417b4ade60f77dd535307df0a4f6f
SHA13686bcd8c342dc2067d66edefc3091d0559f3a22
SHA256de74b3264c27fbcbaa6272c115cd8a1d943202a4243c4ab73130dd5739ad0ded
SHA512ca4eafb7d696af239a04d5823e2cd58a52a1f7ba95b80caabbff4b8f80df6dab50f2076f427519d21d2c4ce7f4a1e384626a7e16dcc21aaea521c83efff09e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a66a21c4ba34309c8e4f4f753967b4
SHA16d1f9d069f36946ca6bb125d5f233fe6947935c2
SHA256c068796262387ce060c5afe7ab30d8f30b370431e5aa01eeb8477006971cf0f6
SHA5121a80fd56c404679c40d1ab307cf463031a68f750239136728e802364e314340f5fc1bf64acd2d055be5d261a47f12cc8359fa15d92f3908017280d282f2212c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d93fb50fbecac06ee6b119ac4494b5
SHA1a7ddfb378efdaa6d4c18603a97c768b29712f0a3
SHA25636bb394ce68f05ca1bb8e80b18f40614d78d4607622c801117e87ed843a6f866
SHA512a2b8b450b429d548025d6db0fef8447619c800b7a66577d2b77ef771cdddd25d71333d9be993f7cdab7d5b95302bd4de8e95d3e382fa93bb38b543a8484a57cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd8dccc647bae57abd2bc3e7e85f021
SHA1259ea0e4cd51c429701a1aff7b0421c470953815
SHA25685a0d45618c959b796df7603c0b5181bc79202d15957b22366e25850792d1fb9
SHA512b0dda2a758bcddba2d8993ce06b126f60201510077297c2fedb47048d78054eba9c02f1b7ed3991e4a483019b6e301b6288d51da81a7225a7db7523c8e074d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50896a932ddf6f7d7c535b940c4f68fc6
SHA1ff89148bf673138e84ff19fdfd5310518bd25edf
SHA25642d70fd434d73153e97db6fc7af0c14951bed4ad79d71c0a9c94c29813bac9fb
SHA5129a5354a0312a15bc0b22d2ea97bfc41a16f9885050a32ff9424da1c9f41ffc9c11eb05287fdcb27363467f14e8d033d2d6293a32afcfd04b307214529e574527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f418b86b7cd1caa12d6f0699f9a46142
SHA10c3b4f4fb48d45c9511b8b564db91b29e27e84dc
SHA2563d7279efeb6c2704d5d84a4dac93863aa171e363cfced698e5808c864895480e
SHA512174e3260512f369a385e9f994bc7094644633fe0f6d773c3bec0ff3dcc400065d06ba0cdac07bf4dc6c3d2cc05db678892e7cc35d0acc4fc98791f433fb2aff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c04282553a231384e4d77d95687c72
SHA16797c6ac48d5970a427043e9d53aea6f63a84ff8
SHA256e38a674bb66ec4e244cebe70dddec573ef0bdd38c2b8bc5073cf33f4d52b5311
SHA51224ec2e032edf30f0d6d59c6deedf7c6d7c6cb43b9343eae85feb7bf05726df8733abc93cf53cd27dbe909d575b126e661c43d0c78e271dc3ac6e44e5739260c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6485d1d904eacdc4b4648643adef23d
SHA1f359c250cb42c4f1f1d98820125eaa13851cba85
SHA2560e16e3f5590bf5bbdb2d74028b383bb3f1ab8e3b7158f821887b3cd8ea354a8d
SHA512391c1d7a2633bdd19bbb143e71f01f25edcaa65da1fde0d2fc28eaea06b82744045c03fa28a4c0bf8e2c2113bb40a02913e384e7a98f8ba5c47b2a816e7c625f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0736bbd97abb01c12b3b303ab979295
SHA19d14200f752e039669ec9e628c020c323fede918
SHA2565b1a4f3b5d650ab91702beb50f78d2ef9ce6adc5cd7bd02449a1a3b44f6c32e6
SHA512b6802af96fe95a679cd05107217428c0a8f50073ca41bdbbf167f9dfff3559a3a164cc437043a92cb5a0419ac988eaba454996e423e8d2f2b7090db56f716476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072e4aa7c7d064e20ec0d0922f11f529
SHA17dd6a0b02e6b692adf28dbeed80dba9d09535f0c
SHA256a69a15ddf7162182ac59c0f28d8d343c13b1ca68db3d95409a5ba7e4b7a2555c
SHA51241c367ff34184d08fada55b1ede1356ac3e1bc43e5de96421d44f5181fbcd7944e242e60bc11df4925cd974dc54887e9cd4823afa6e99045c1093f49644c9622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ac7ca895884deeb69270e1453cade3
SHA1c43aed1dcdb891b43212df971434f18645867868
SHA256c6c414e1a8decf500036ea16685997fdd666fb5f941240ed3fe08a26f6931d31
SHA512b621492f7f9c50f469a1219953328782be4c1b40f01d9b5b6b3f2b1a91dfc883a41b5890a276472a1b4e09a562df1ffa67dc0a468d46850ebaa045a0df31b80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d62c071db2e591ba3591a3c50fb76af
SHA1e7bc984ac265df166fbc5879617feed93971cf61
SHA256819a754af9877dff0dd312796b11312798995fa49e9d5732032f50fe6fc92f3e
SHA512f6e1fe1e633a434be4a2c45afaa1a7dee7da34393871bbcb1571f9ad1a1b70bf9bc176154b06b0ea811f3a66c499608dbad9dc82d4b5b48e403a8bafedaacf8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef33e9e4aed00ef51e9fda1a80507d5
SHA1308eff563afdec370be7c685b433cf13d324e9ad
SHA256ef2aad3fefd3075ac9e1a399c2f7f13b42d6445be78ddaf9fe12b13138201516
SHA5125f9c73ad8a17e32c85886eb1d48a4e8308fb2266536405a939fbcf7aca987570855894a30fd399db5e9347375b3e037a45a495a70734abc4d718da3fd5b8206f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db311a83dc347f60faca32cd6d761cfb
SHA10e3bf98e0f1b2267aec7e695cc57b65d6faa9bec
SHA256177221df253b978ed6946f321ce0a05bd61f8390be999820d7ae2697c368d71b
SHA512f6b7a2e4bf21ba009c3b8d5880e28c9996ebc2451a45650f5d7799e14d9982aff9341dab4809dfe08773cc5d60414f5f5a3b304fee3f2668521494024fd0ce29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b