Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
faca6f6bb31e47c53db3d1f449279bba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faca6f6bb31e47c53db3d1f449279bba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
faca6f6bb31e47c53db3d1f449279bba_JaffaCakes118.html
-
Size
45KB
-
MD5
faca6f6bb31e47c53db3d1f449279bba
-
SHA1
72ea9a9591717c53b657aec29fb0c4e07a697613
-
SHA256
532fdcfcb9067dd5694399af931709d04e31aefb0925ec8f34741b3d2fdff9e5
-
SHA512
81e150183307ee166868d6bc7066ade4e5b4b718c8e8d7c752d0d6381d6aef615fe277ff7b271654d0bc9e85ce0721a5ffaa95bf058f7f3fda8e9151f708b47e
-
SSDEEP
768:xyoe1ybsoG2C7A78z7A78WWhsrZ+7Az7Cusldi63r:Uoe1ybsoG2Cc78zc78WWhsrZ+cz7vsl7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005a46e815ef69c01e2e4e3e0c2a7a1a2232f5c38d51baf13645fc76114b3b66bf000000000e8000000002000020000000559e616e433e46f90591e3e8725a390c91134a824c63b66dbff3210ef8821e5e20000000eb7d1ed6c18d5a9489d98340fc3da5f7b2a631de3e25977d147dc6ce964d2079400000006ca8ae866cf6a666cdc5db931a341e749ff78686de4efe515cb0d94bdbff2e2710754ed7e41fb96efff1134c329de34b9c4119f60637ed8cc64079b17d308682 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c17f2b1511db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53554411-7D08-11EF-9081-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000044aea13589201940ff7cc16c500f1dc7033622708d83e5fb0a179d8359c1f11f000000000e800000000200002000000010cd2172cc2c2ee113ba19f671783881eb6d2c03859247d86d5281447421ce47900000000aac20a877ef16c673e083a0e5cdab127e4a1356475d7da06ff20b737182c66f25eee93568d1e55b717825081c2901b2e0f81acff8efc2b2b54dc7c4d9a646e165175c04fab1f2f8ac2dfbf2635020f8f726f8de15395c9aa4941cb1e6158bb2a6387d18b779bbcd84d396f8b8b05c7fed090fef8c95777ce124e7d8ea5d505874f407a9a9bae90eb69e9eff241215d3400000005d975ad38e423b4e978c97e78866d2e4b3ad703cbf046673546db13b893725292aef811e7f279aa0eb6a5061ef61ebe98e9820d07cc58d255e6cd66aa51f2bb3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433627885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE 2104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2104 2272 iexplore.exe 30 PID 2272 wrote to memory of 2104 2272 iexplore.exe 30 PID 2272 wrote to memory of 2104 2272 iexplore.exe 30 PID 2272 wrote to memory of 2104 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\faca6f6bb31e47c53db3d1f449279bba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bc3d85c4f76d40f4b5d91f7c952fd5b
SHA124ea0bb7027010d3725934416a0affd0f3deb3d7
SHA256858de0e719db8187dab1996d11faec9f644cb02b5d09a025ae9104ef3da07710
SHA5128a57540e541397ab6ab842212c5266330f2f664af49220ec2c2adb7bd642f1dda36770ef5f7e53e753c7d3989721fe45c51d6b8a9823c733cdb178c18a1c6b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ad401fa17823afed87818278d3fdbb
SHA1dd42c6b221454da4e0640badb04bf690e21bc3ba
SHA2568e5f73d74bf59416ceccc78a559315cdfc248e7495364f44bf2da72f6fb91442
SHA5120652048b50f0d55c70a5d32dd323cd74f9f54bfcf8a5d84a9c92a874020c23c3bbeb0009b830255dbcaf6e862eaf4bd0a461976b66c58d559ca30b9b30f73ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a91d8e1ab4fd2895f07c6d2dc2fdeea
SHA1dd21a8f7bc222d8ce1af60850b355ca35008ed0f
SHA256d7d9ea3e296499270290efecd769322ca05a579b2df3a36512fcb488d3e5470e
SHA512620831432a2b557cd6fd1fd36055219ad727ff3a8abee1372d6c630e729dbfb5a0d78bdf13e5394ad5c39d1f684e1ef99853f05d4163ca469126f98935696837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebb7984b7aa7351be82af5fdcbbe150
SHA12937f212194c4d536f3ad9495b433ab185452280
SHA25614c62355c928881bd329741623bd652d07ce72b1ab8fb60e208309b66343c143
SHA512722ea182a0d323cdcb24bda3d9b66d1cf5f59c39bf1850220a4f44b6c95b0c8185e051cd8b36458fcf113309f60274d31ae0771a22bcc63e5f500ce884853dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503baa4ba4734b5b96841df75cca5ccdb
SHA150d047af9c99806d77a54641f53b0f0733212a59
SHA2563f1662d16bf8f7613715a6b514cd2423554b0d6ddfc66903a6086ab39d58bc43
SHA512f45366e19d514247570f6e074a91a2bc05f444e65f9157ec3f4e60e23924ad447e98344cc72f9abdfabb47f80a8110a20a69d6c7ad9107491ee4624b0428c883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c6fddb12affdbce316907af47d082f
SHA1051bdf260a164462abf8d318cb39876c70fea8f0
SHA256cf125512d64922fb92770bda219253a1712d5af6a5ab111b5b7b2a6d579b18bb
SHA512898015cc2f5af6f0c0b1d0b77a97008fc5ee666473217c779c2b555724cfd3df26e4cd179c38643f596be5f6f55aee7daacf786525956cd5ecd35b0445ffb544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519f4433fc0751447a2d18a868988ee4e
SHA174c362513f8900c94e7fe90e38611cf7847c68f3
SHA25681e4c7d888f8b1824fcf586eda84832e3ff6ecb3e373735aaf2b7aa766d473ab
SHA5129ec45b6e5acadf25b78e0002c93849f62b8d522d83ad2b879336cde513001ca7c669c4a0ae60d7bb32562541f01e4f4877f252d3bd89f22ea3b2d182a0e63812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e454aac05f4cab8640a9dba9b3edfdf4
SHA1a45f2fd5e1f6a8dbcc52f6d4f86dceb5193fc940
SHA2564b29cff6b85d1a608e9d4256be8f02316a0cad6326dcffe6716c1e8594b1a8da
SHA51219f816994c287fd2a723dbed018415ade4f84dc57ca42627f53c24193524cf459a333583476a1404512900cf1456697f6d51feff680d21bbfea32e3b25f7f04c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5194fce79ab2c2ceb1b76278fa50a6a89
SHA1c918d3db518b857a60973960f42e02b0eeda147c
SHA256d35734501381e6caa8034887e636cc2387094073c2c54c34529011b60fafdee1
SHA51280c5cb7aa721d7fcd51d1c91b93bf5cc150cec6d3a0a49c4fa33cfab193aa663cb0dca863bf7e9f10b1b72d2c8e3b8ad1c0b5e3f483f85e4346d6efcad02dae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaebde374f31747ccc23af088161701d
SHA1a25e584d2b6ed3848628094d6187c8c639f8a900
SHA256d9bffc4b237b1f12859b4ae2f56370e22242ae274a0a09d260af0a3616e29f2e
SHA51264fb3845917151fa6422c0e2d64e60dbef5d7585e06f305a55152c07db4f3b1ac72d80816b362896cf6b8e46df957bf60507465f36b7178490f7d5857870bd74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54098b356dc706e9cb9f3910798e3ce77
SHA18853ef81ae42b27a4013064aef19645955e33188
SHA2566cc3c653d37721c09b9b2ae6777c99150e4e398d40635b54e9052e08db12e413
SHA51228229e4740eda2bfadf2ca591b303c15735518375e9ce8cd80076b3af8d29864610537630e2fb1a1c62db292877a62a0af2d8e753a64a1b7e7932496f81f096c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c61b6239b67dba09c040b79a26c8cc
SHA16b03d785520996cb70412662c36893787b60d906
SHA256da83420ad85ffd694c43642785d8aa33ca3c1c75470154bf5a295692a60c689f
SHA512a4bf21774b186a378a09d24bfeb658ac2b633bb9f9ace45d7e426bfd6519d2ec832773bcc15ca1218a597435ff58afb7dcf58cda5e208bc9b0a6227ee50b280a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01180e9b7a3f0cf65ffead5d401c9d7
SHA1c6540feee2af83147bf521eaca32e2d859e9f340
SHA2565efcab2577093705b441e6bcf1eaece11464467cbada8aac17e732089ee7cf89
SHA512fe82f1e64851a2716338cf083e661696ceb0089f06fc716a6610109ad480247c8e4c169c36baca76086ade69f18ad802a1ba187b4c5555f0f132f2c93d7e22b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58144379cdb2e0b746c59248ffef9285f
SHA13760716a2642885c061d593e3f2e45db5bfc7786
SHA2566d41152101bcffc854fbb9d5abf4ed51e9b71dd9b2859abc44c9354963d8c35a
SHA5128fb7146f0b074dc910d409b199438814ebdd2745fc6a1b882585bc69aaaedf9c7bb4260f26cacdbcc1dec3fed80cf54207d42f14543355988ba6fb419881d280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b456dd9517022e1045b9e8daaac1c37
SHA110bed3f9e5a343165ce5e1327690f11dd0bc43dc
SHA25631ff1bb30dc20ebea81a93008a87b349378c71412e171a860dae6e86cf22c0b9
SHA512b6121f4798f8ffd14edea13460cb5cce20dd8da8f83a00fb34b3f7d011f991ba6a94ed024a22b1bd702abc817fdb71e738a591c2ee6278ab3fedf1655de87ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6a23ce180a0a9cd62e2b2348b7b7853
SHA15c60c2b514e83fcc8691813b4d42504f484cb55e
SHA256e485a2b7b03def13688a94f1392916fd5846a2dc1c7139bf50cfceaf76b814aa
SHA512edd295615b07575314906538a9024ee0e2978631790d43a2ec7da25377e4af9944170f38d750b82d4d77dc3a511579e1cff643363875ef5689c1f08697637ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbf42e52468b67db2979838022b82f3
SHA150adcad6c45b96c6580d9dd0400e4a14e33a2f69
SHA25666a66a30c2c584d7e16639efb1ce6665cfb8b03b472caa787ca82aaf0661f9a1
SHA512d2ec391cec69ed112ddd4f8f680b10ad6addd89632b0c622123d18b2ff800c48d681ab114c8ce9bd2cd37a1d67a92481db3f249573379378ee11e2f51293bf2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51022a01d221e4964bc6229425d98033c
SHA125f007f38692db4ef39c3123cb0ab7b91f8bec99
SHA256712d779ec5fc1aedf28d6c68911eaafd1b34f3d257ad6471c6a8ba370657ecc6
SHA512d18d258d4cd8136acf67e6d4e901074800684f2a1c784296347c9c6f34736f6f3900e3ada47db5202fc6d73d355644dc936b260458503cd67a7e2f92c74aa717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c76365f2ae216dee050c67b879c944
SHA13be2dc81d4793ffdb7348485bf2a039c0398fb63
SHA25654d6a4e5696644761f6c17fed67f0e0d7ad1acea5b3d4f2255dc1679e38244da
SHA512c0e054b345d8f84f93f06a1d0b33222074fd74569f2d414a0f62ba5028e63bf37dd604c94c9ada82bddbe4c24df63528142b57e02170da6ea0eb1609d9de2c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5945d3858be74783fe89376cd00491ed5
SHA1ba140723de989ed195a0379433ac3d03ec8b1e8d
SHA2563ba9246b39cd79e90e55af8e7be58f3eb53fc203683eb818a0e8faf7d591ac6e
SHA5128a0f6fb9faac1904e047167c7204e4e9c6f275b0e312886ce70f4a463a9994efc47495a5781b273eacc2ee247de36015dcb820d90a750a3d51f3161db2541a77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b