Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
f7067d1735cac29c55fae468b34d3e5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7067d1735cac29c55fae468b34d3e5a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f7067d1735cac29c55fae468b34d3e5a_JaffaCakes118.html
-
Size
139KB
-
MD5
f7067d1735cac29c55fae468b34d3e5a
-
SHA1
31ce325f027d8c88a1868c966854b785ed16873b
-
SHA256
569c3053018145778df80213c7756e9b270c5b5976ebb282d9c69a34a09384bf
-
SHA512
b70bd31a73511288d8316ef6f9201a5470d9166cdd6a57d8a23a335542267a4c42fe1d676facda52c932925c993c223ad9c6550fc45f814f598a7f224c987501
-
SSDEEP
1536:S3t0JgpelLyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S3MgcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008608840a666fb46658e2f4ac2594c5f8aae825dc7e37e1b26813c7f733462887000000000e800000000200002000000033368b1f40908522d62cc406297a4149bd8a84f766b6d533133814009013716390000000f48df618c406da2264e53eafd2c56591e035b159fa6ea4e6d74478ba73e85edbe86eab6235a9b42e8d8920c2a4a2dcdd8987f9db583f99fc27ee78fa2cac4b38b1caaf4838f2e10811e746e176dc2dba7f0eb8641e70c0dad6175912bac17eb294c35e4d40b1b5ab57a4a689509ec1d9b3cdbd96cfd8363be2bed8bf441328c003dd00d0a5240b27c0e4d4efd4ed117240000000bff6a0f01214548ad3d1269fe4a3d6a2c8ce5fbc1a9389daa0f1e68b39dc3a9b9ccb9831134f70d5962460fec503495e1fea2ff490c64fb06ae2d30694a24375 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000093f8010a1b2afad7d44dedaf3b92631ad03f5a6c4b1379e2ccaffd67aedb9997000000000e80000000020000200000008c31044ec44ecbbcb174e4852beb109cc57b17ac0b410f74556315d097be2e7f200000000921ce2561d707cd305d3dac71350e428e442f162151c7482edeb509b2a4271140000000d0ffc004f4df48e6d9b556204e3386ed2d56d76ca5e91b6f0368709594efdb8a86df1af9261bde4db6420c10ec4fe770a5052a4630695b1582fac00874f32990 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433467077" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fdc3019f0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9BA0F31-7B91-11EF-B59A-E61828AB23DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 700 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE 700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 700 2124 iexplore.exe 31 PID 2124 wrote to memory of 700 2124 iexplore.exe 31 PID 2124 wrote to memory of 700 2124 iexplore.exe 31 PID 2124 wrote to memory of 700 2124 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f7067d1735cac29c55fae468b34d3e5a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b069cdd0be27c9005833e1ef6e1ea88e
SHA153466f9281bf10b11b3cead636662ff5ee3a5a94
SHA25602a0d23dc9a39b07e3bea277adc4f264ebaeee80126ef1e9dbfa3bf351e229c9
SHA512fbbff90439a7d6b1cbb642a30ddd92f995b51c6bf371dcfe177d70abb1187ae9a54662dc5a8674913a91522c1c1efb09766cc6e10a01927be18a96e8d229144d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c975f7691ea82be9818f8aef67b80920
SHA1bfd86035c5b9be57569161d21769987bccf49c9d
SHA256fb62c423c3110086c7a1e33e187495a001fbc8dfe17447365da79dbf50d3318c
SHA512ca73e38c32affa9f012d3439dc209eb18b7b97fa45a2f8e29053cf19c6be880c946c2bff8eab51d851de8edbf50d4a7cb7adf663d2e59fc13d7cd56f24408edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5971705651e711f12769fc8bfc331f80a
SHA1364193afc7439e2e1f118a03c2a261962f73c6bc
SHA25698a58e288b0e118ef51cafaeb5124fb7e3c7825c47ac4c6d9f394854178ca4c1
SHA51275ee3e6e7d5083bc71677ff4d2f553571df04f751ce7e1dba8844ac7004055dd29b16c2947db2791a9bc405649906375dffc9f87e528861190a348f36df764a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55957fa41ce7960e9048fa0db806fcc49
SHA1fa18b1f64e8a82cd62f582be971889f072bdeccd
SHA25661a3b55b68f0a766426f819ca46947956a250a13b2372fc05f4ea22aa865d3f8
SHA5126b15bcf723f9791c4183398fcc6b30200c88866d1e7a1703efc281586f646b4796d63ec5169553b5159bb7d550f60d15effd4b21ca83c05c1d357fc3a9a758b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574eda1aba41790b8990769c6d39fb81e
SHA15368c5fd666299814c6d812ec6b19f696d32ef13
SHA2562b334a5ed8aea2f8a69a85babd8c739e1250b2deb282220a4410d2b700605fa0
SHA51263af2d25aa13954116d64a11cd8bda568b8206c56a696da8e7c1288387e37fdef64b3c560c3fbf8490b77e8cb621b23fbf0142e62eda54538f6117dcc45e99b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f0bfbf159e5586289e9cb9aa21e6d7
SHA1add5da6990fcd2b2d08ac337dd4a0d905fab3b57
SHA256712dd5b66c9ebea299f10af3b64d45ab01a3e6a16d558a3c47fd22c8b44c3fd6
SHA512004f009f30415c4c57621738313059374fe8237bb8ce91a18eb3556a9ebe84f3342bb52fca15d4aceac36ea8d62063cc58b1e13e54c3f9e14145deb8900a2b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae079f508697c807c693bca728a91a36
SHA11c3a052a880c5682f5f446bb521fc774eee668ae
SHA256aa404acb9dd2cead645ed3e4621baaec00ae9ab8039b518596ce24380f428815
SHA512dd29684ee060974672873cd429d56ae0f978074b0225875b8715d4f83efdbd272b33734883aca6c73b250cc27f1fc24cb9397d2995b35d34b85ab33aa639f5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552de01d6ba42561f15010879b5bf0e8f
SHA1c490899b49538a0d0e65d0f6769c07159ccf6042
SHA256e85d91e71dd13a883318afc6690da02efe10ba1aea994bbf09474a6b67c69db0
SHA512cb12b7841ddf8e67d5575185322bf610e9cc410d3fc80ca105c4b2b016490ecd2c93ae321c0c3bcfd78ce6fe5fbb72baff057fbb5baa36ffda932555945e56e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb429928f44c4268607bea026c44e562
SHA130cd508f5c2f4d4a3b542c6f679321ce546efaa4
SHA2566d8c0c23b4804ed45c3204ed88db6261229a2c5da24af36e610837fbdd6af4d8
SHA512967eae166dfec201da66e89795767ef7082792fa16114295823546e8e574c205239208a69c7ec3649abd5446a27825f124c31816e9195c3d9bd4fce136750020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c101baf148aa453550f667ee49415adf
SHA11f90d872a61e88cd0b78c6a5140fe910ad22fdf4
SHA256fac4b559106855e1f3d2fc4d462538696ff2d86894686d375132aa19e0931c46
SHA512dae126cea228d04f89f3874cf8ac1d51aa6d5f10eafcf9d8bdee5783ebe0f86150d486c3433f7dab40ab0074f274c1607dc765eda597d99335a2947343a58b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588beb6af0cd434c5cd1cd91b98c99eea
SHA11a0e909aecb55331038aa9f9f092f3f93ae3715a
SHA256fa42ca514fd9560011a2fe856469e723b4163eef4e0cb356c0c2f91e498fe43c
SHA512cc3ff5f6702ffdf669d6cdec206a1fed58840b0ab5937fc11f0d0a808348f31d29dd9d04aaa568fc5f3a974aafa2fc9fc037fb2ddfccee2781ab0d14c023d4e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad6c0f29737d9b64d728d4f6a92bea2
SHA1118dd4acc207536012a6d36d982f53c599730051
SHA2561f8b0d03db604d0bd5e2a5408a767a7d46bd13aeb72b455a902c8d0c89d3a4c5
SHA512a378446374ea08fa14a9b3b63e0a6c7c68dc86f8e46999c865f453d9a0c34085350616efe256c51ca0ef196bb37e03493faa4fd6c362e50d23276a7e78d53f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b57be2d5faf40fc83d045cce33c93f
SHA1aacaa3a4ad1ed46d0d8ef19d67f54e986a7283cc
SHA256b46cc6ec7934595caad707b78e51ab909acbe80608d2f56de83fea25fc771410
SHA51248b5341fd17202e7f783bfb6e2d5c89b9e94ea1912d87c3d537a9c4218f8440cd768d07a7added1df4f9bb79b8d4dcc83dae88a82dbbf2e7daaf7f0192aef4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc1c478499347016c177330ad7b3b6f
SHA17137514562e93c457a82efcb0d855d1eec3d7e3f
SHA25618de5ba13619d092372808e91fb34e6ee343c7078dda5765bd2c56f0a84c3a51
SHA51236c7a4f537ad4cae7d963e805be57ae949211c1634dfccf563928886489bce5dc81b1c59b8f7698624a3d91bf8a56843d5d094a1b5f5beab2030afabe4cea2ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b0e4838656a1bb44d167cafcb0ff10
SHA1b926d4f5b2748a45e28698a1d78bf0e62a778860
SHA256343fc1a6eaff483967384a9e82bdaad47b77c2f08a5c8e1d2680f7c8da489c5c
SHA5129eecb61dd95808abe0f5c385b426f30d8bbda0d3b25604da0fa91a031d4539dbd632e314f204ab194a496b7498ec9dc765afb2343e394e6c72085e23611a92c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e96054122a2ee1ab63bd99442cafee
SHA1e4a6b0fe26495ce8689a88498440e75fe6ba9ccf
SHA256c54371336d21c569c9decf5f8919bb30c0d6179e48abb8852122fbafa0b06c7f
SHA512f4864365f39d552a6078843a7a78b73ba1b8110f12f133ca2199de609bb574ae88ed9f53bc9b1d44678552a87b2a6564388133c308440eee75edbfa66e4666a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2ea5c563feffb3894fdb6644aa73da
SHA1e122260c323ba278e98b9fb4d830a2fdf7116065
SHA256d5c940acc8526c154f8b97be7a3f00b43c449728da756c3cde677d508f49756d
SHA5123c12e2700543bc6c34419a61b64a141af4127ae9ed92fbed6d0a371b0485bbc770c307ed04d994a87cc3121be8d9e18353d6f31d867503c802fff0802396996d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b7d5eb443067fa859351ad6ce74371
SHA178cf077612a4cbb704fa67f6cc9f9aca1352a0ff
SHA25621b16c18612e1c7a9eddbccce5802ea116862c23f4f2486f67e890ee692ac6a0
SHA5125be25fb3a7b17841f39f15f81fe7258d8d3f88d738fbe04a60ec57e34f1b24d7f4c9aa04b16a3dabeae0243058fef28d7c3b5088e26bbd993ff246ce44df4806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59396597f2f6e87fc440dba9f519eee0a
SHA1b279fccc6d0bdd0a996cc1ade1e9c6914783f7a9
SHA256105bfb23d74917a82d7795c8163dcb777566eb6d17ea54dc65937c681f2b7af6
SHA51286f14d2bbf39dbc98b0a8b59eda9e50d2d23f2e65e67c797cdd55b51d4fd76558c97aa928a12ccd436a606ae4fedd8eb0f85db92529dae999d4e56bab6e61365
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b