Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html
-
Size
52KB
-
MD5
effb4b41ac1c145f77ee43ccbf79333f
-
SHA1
e1bbbc48005efb7097b1c2432cad630cb6e777af
-
SHA256
16ba73e7794ed276731f76811dc592789912fc8b86dade390f6c8881c6bd84ab
-
SHA512
3bea5b444b9ecf0a87ddf34b1f655d3065bd170663eb276185748d46ab1d3d5cd86cdf01dc1b42b59111210bad90f99bf20f52ca8265a9886cb0de176133c835
-
SSDEEP
1536:WuwW12lSWQIaAkNnh9L4eIaedgePqv5ljeSAfas3dhy:aW12AW+Afaszy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000035654a0ae69195b6b2831af7bf924f80daa1736fd2cc3f4c74e9593a25b30fe7000000000e8000000002000020000000a4e8820355f5f8a61dc3a8a7198c2b8727ec1590380ca1ca929e8f5d7062738e200000007e58f7783e38ea5152cec1d871f642354d4037c62af75ec08f8ed086ca4d3e2640000000201fcd950027d7ef167e85f46462ae60048e7e0d70c5b74a21be552aaa767ad072b86c2a95427567b37b28b31ff2341a823834d784348a7efa8986f54cdc8f89 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bef788310cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B151F971-7824-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000668c60bf500394a88f1c6ea20b572c97921a0b9f6b68ec2ded5286232e7cb6e000000000e80000000020000200000009dec4aa26aaefca0ed21013ac4796ef94e5757e9438f6b6078ee181e2a81aef4900000000fe5879d0d76653c7a983b72f3743b0f9ad31b9914e1eece984447affcd76ec6646392d4a3764959f7ff94271e0f6d9481bf90454ce6404bfe5f9d6bf0d4378f3034403e47f2b295ca881a12a72c66ed622726b0ae045de438cee0dcd843a6ec173746984c1bfa02b146e202008fbb6bc48f48d9b5046fbd1f6de79051065d55d03cec583a1630d22a427b08bdb115454000000012d4910ce915fef2bebd5963913988d49cd152e304a5073ce8e44092d74c986ee934cf2f019fe2520131f97b985aea1d80d80ba556e642350ec00f135b97624e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433090316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2828 2112 iexplore.exe 30 PID 2112 wrote to memory of 2828 2112 iexplore.exe 30 PID 2112 wrote to memory of 2828 2112 iexplore.exe 30 PID 2112 wrote to memory of 2828 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\effb4b41ac1c145f77ee43ccbf79333f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54734fb663110051c239429bc988542d4
SHA18bd03b0e986db46e8363fb08ee2a9d6d4ad84734
SHA2563d3ab6f1cc19b79624b741246882405bb9a5a82ac4dc025cfcfb4733c81c3726
SHA51234e038123dbbd7d08aa030a9d467b85561a8d34814711fce1343cda1ae973a9033ae9c63af1eacb38842207424e3b545e29eb82c78513610d5c7fd2be5677ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541035c1b42493326151fa8ce8f7e4c49
SHA1842aff47d9e16d3ff0615092339f61d9beb6a955
SHA256f95f8e36ed46af3f14077012dbe58d43d4a5ca7560a9547799060fc88bf27d11
SHA512d5988b04f5419b301bb6b2456d103b5aedb8e7f2c1a8242e80c1065cfe09f0e7a2cbc91fbe62b30c93086ce7427b4fc938e359387783021cba0e8e701e55edbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba13441b7a13db7850e36a2e52edd1b
SHA1b2692da35cd2d9aa4d505cbf915389a7bea59b14
SHA256791d40d3f26e4239cfb999fca5aea5a0ae3f2780e5e0816f79856cd0702745e4
SHA5123ef3f8516c5df13555be73ad536bf2fa3de9e4bcdbe6f22d7ba9f73e9d06f05196a4c0823d70b79774e20fa685a9240db451d1ee3a6dcf732e27c92adc3ce765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9d8a0d2ac45ee4bc56c020bce4276b
SHA1c5d1a9f3ab4bf22cd8dd4cb3df52d8fe01d7f8c9
SHA2569db395c92c4decad698694bce6d9c27eb000f36e415b726dd64e56cd316410e5
SHA512476f2c78d282aec42bb8427960d58a595eb49eabd5f754dbba9c2f4c4de58b60b96e26001f71c5c2d2af144fe6d918dbef3a2dd1bc4cd55302cabe2c066003c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429edb2270600f9ab71950073d5bd3d2
SHA19de2b12c0e276310a23caf3c92def71f7c1df56c
SHA256558d76b1e00d853965ec8bf2cd667a1e336bd91976aee6506ec21cd0e7106502
SHA512e118191ec84c5172b393882b531735699fb2b2aae7984e440b7ecb060d99e96483f0ef280ef0f397882a070df93e23836d1ee38d41e8a7acbe69342a44d4f28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1d93c8dc8fa1f0fd5b4f11db6c2229
SHA1c69c85c9f443a86d8ee8b3d6d532207c00b37834
SHA25623cd86eca540cf946610009203b19f4ff714797072ed0f32f32f67f73634c14f
SHA512e501a1954c2d7bfffcad114b1f68788e14046bf435eeaa87f7a9709536d331dd1cd7dd8ad787ab71a1e744ba83df2894d0f50913bb43b9f25f205435d9e22baf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b30339e80a340b7daa33cf2066f185
SHA1def0d0d09c0160708492cd2cd7502b530d92b881
SHA256b47ee1b341c4cf18385876e11fa94d77f9599d5c6d4800fc1e35941ed1b16bf8
SHA512a6ca9bfdabacf98b495b39acde00ff9f414da46b7b9fbab0b093d3fcbd9b7bde04e510f366b8773dc767d1ab8c723cfa8f1b7fcaf4d125118fda2b0f9b5a76e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1587c49bd96b0a0b4336fd9426675fb
SHA161c197241b48ab6ba8ff3f7071cda31ec286638a
SHA256c20d36637a1111b012373d4a3b4b7031e9e0130d9e35ca3a0e3362c69a184e15
SHA5120c52ade1f5f4742c63d55ac8d5abbc94f6e7ceb7138e9c2a32ca300c1d324d97e1184d1c1a3a5fd1c655b63f48b36094304fea6d46b82b7cb74fe6cbb5671a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb404eab71e3d7cb1bf75d2cd179ece8
SHA1305d767b1be9c3cc027567c179d0dd6e8a822102
SHA256cb415999fd155c9c017cf7a661aa2a98df2f51e64592eba17a958fa53f4cebe4
SHA51212ee3720e27d6280618e713e5021d1590e17a9a5546d47d336fd76c4bcd14fb1ceef39e6951e5f8a015298652360ecf128699ffdcc43cdf5d2b3f23aca7bb7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43b5f2453d8f5ea51f8afda38392b3c
SHA124f0a267ae5975ac6e4e1b0915c167c395b7830d
SHA256f2e28624bb904f26548a83308b622a5fdd5198154e0020e5fee9e09445c29962
SHA5124625aaa43c604f0816ce44aaf743e711333e1ceb5d4dbd2b4a1a02570e16216f5d511fba43eee3351747fc659641a26c1ca3e064dfc6311cccedfe354c58c4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9180d4e6727909d8268fb22b86efa53
SHA114b0ce3104735679b82e22090ff720f8cf54d39a
SHA256fb9dd3a9c1c6d3a7fe2072a3af0b29732fd38d95279b62a517270908541c76ed
SHA512aa2a4fb1ed271ffe5c68922ae6a729008fcf965d7b45866ac29b2952227726acf39f3ceb6faedfed5d61ee4796f363e52bf26c064455b85bcb506c8cf4af8fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b842611678d2b3281944dc349a6db49d
SHA14968b335cbebc23e635913c6095720a9fc0d7ded
SHA2569928e27fae73674502d9d7fa57a55feed951d2dc9b3f80b394f1e41cc2682499
SHA512f5e5620d181e38a6787dc09d16f105115b4592dcded7ebb61373b46cb26364b02c4a160e8f47f1ec5627ad238b99ddf50580271460cd038703bb8f2191cb9dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2bdc603469cec9591fd442a49d0583d
SHA1596b00d235bb28dd8af3fecfa0cfc36d9752cdc5
SHA256387aa8c9a9b22f5f3b2de94ca892088d4855f23d9f6f45a9b36a631b11fb1bcf
SHA51236849861565c81510b0b1efc5cb9da6fad93ddbcff6857722f8071783444e34692c9d17ac0f3bdd3a4a8cca59fc383beb29c4012344e81376f9521a5b7e91b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574156a13cf3e1ecbf84e7ecf20fd1049
SHA1ac7ee971efe55dd68aec3c69e23ab5fc866ae97f
SHA256710aaa30b9d8c5e812d27ef87a53a4ca10b0034d4a4e62b783b758534d11f1cb
SHA5121165ba4caaef75eb33fbbb7ce3c6c208c03580a686e3fe46e3bdb85eda9d8ea80a423df1170edfde9889f2c1aeee6c4cc16611b653807a87b7d0e56f1df86cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056f5d252158a6638f39b9ad850399b7
SHA13e4d8fef47c93b44db98d51d6eac608e6812ed42
SHA2561a4acd6a1dcec5174285f47e5f9f373672ac4bd2e4bdbdc8f3d4a9f443471065
SHA5128f771f09f320a91940672ac42bc2906f9c28111f7062669f0ea403dcdfd35c3a0a99ce59aa8fe6966d20d3d86b13613a7219fa73739a57eeebf885c5d5094233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce767b62ba02e048c8430e421aa4f23b
SHA15ec82bb5274326e285d8dfc35da923f7aa0d1427
SHA256480d9bab9ca869ddef792c7df10f3608ab6da4da1fbb4712082e62c2ffae44ba
SHA512904377c2c74bff866474a8523b3953ab2162e53b64bd669abc466d7d36a2933e82bd63298a4a180016d7a8f37964647c12ad063a185dcc28dabc706a25db4fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ec3e901624e50d56ebdb1b67d899e5
SHA1787faaffc9458d84f21fd59fc72a54ad5c0211de
SHA256ce4f475135f35101546768e439a51be649c1e1a73a8fd19c21807e1c225f3623
SHA512eec328de5e0f834a87b1f27c0f609b146268f44d61d26387cad8f0b22cce9748319059932c87351caf84d730e2e9139c9df5c71b4268d99b7f6aeb920f8668be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba43dfcaffdce358a1538b838d92da96
SHA1508bcd5f0afd0da0d1d707870c4a527c180e2693
SHA25607edda28ea4e0d9a5146e178ffa03ca0761d5449a87a89dda565431718b7e598
SHA5125ebd74a893298c3d0529be6a77bb5012a830c8565f85a66b7d9cfef2d8234e0f2c5aab3386ff7cc5b7460c70b8604ae32bfd28894f4ab68631c342b22147dc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5ce869dd91220677884d1b15d7ecd8
SHA1631c9025833de4432bafd922a82ab245408ef52d
SHA256e73ec4ad3c3dcbf746e593ea18b2b03e8a00b1f572eff767645643af20321f93
SHA512591e4291d272b9be84a3b7b9bff98ef2cb82cbb9acde9e404b1a721d2f239893e6dfc664707b809ab11b0cda5392d90df6b1adf4559857641ac0d62dde8e1c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afd57d65271aa7148a301cbad9bf779
SHA1596a939ed7e6b77774c55ca131e35b2d55ee9ed8
SHA2564ec79bc7984afeb65ec94c2a1dd82bb49c3bd1e5602fa4b45cb1ab95b4b08290
SHA51205d65390a42602a7361dc3f7479e116b90fc055fe1ca3cf490b33047f610a17330c6c3c7fc0f4520a967527d1464103ef3c647dbda250303db0ad8d3927f8d8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b