Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
fdb0ff138b22b1ee0b109cddac4082a1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdb0ff138b22b1ee0b109cddac4082a1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdb0ff138b22b1ee0b109cddac4082a1_JaffaCakes118.html
-
Size
26KB
-
MD5
fdb0ff138b22b1ee0b109cddac4082a1
-
SHA1
7b5378812f100c3b5fda9199541f474dfa74bc43
-
SHA256
48d718e2b190eba16dc564c41f8aed607c8802689373f860719027dafe379820
-
SHA512
fc0395cf7d762fd5eebc907b70033906dfb08e56e4ee6109f99b34adc8351b289a5297f902bf0de01f29a6d01bcb53e6b8f364f8bf449c97324ce63bfdd1edca
-
SSDEEP
192:5euOZtA8JavqfcJDUaZq7B8lUf+ogV8iXorltFTjFZkqVUX6DWPXjSi6rI+vgu:WtjqCvltFnkKTtvgu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007527028bd44e8fa7bfc42209d9d4235e3bb2b45e9dd6f1ec0ca0d0560c8bf556000000000e8000000002000020000000cbd4169903a86ffa958a4b931823ec68d72293c271c931498603dfa721ff3baf20000000d65b5aca155fbd2e2e7bf1155cf9950ec71d4beec6565cee516e64af2a8312a04000000061bb4158c6d2ff177fe7ada42edb4acd61ba2d592123529bc40cf57d4269e427fef5155b95cb074e5b3f0c2df6eaca6fa7a4b0d6dc6e616402d91e367d075070 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433741501" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DAD21BD1-7E10-11EF-BD50-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000dc55b3619b181e352e2a453d1a438e58e0242946842d1d1fa7f073dded5dec3000000000e8000000002000020000000f66d5b6a8e71e942c359dd48e43f724b66f6924bf7847a0622b31d99424dbf3790000000cf421c467fa69a09bc2d08e648541dbc6a59c47ed43ce2fd406e5a18352f3614a22b0884b07a3f4f5de1dd8050e44ca32be22320c24fc186fa48fd097d2195f5cfa994fbd55c41d116dff949520bb1a5224f339211d9040aa5340fae734bbc046368e318ddba5ee5444ca23f74526c8c0c8335b9697143af014aefdcdf05ee507f19c8ca23a4ec4a60bc510e0be19767400000004dac873023cb0283f04e32d53a9dbcdf990530e8233744b66004b729d809d4b31e64062cd110ed45f387045fa087c4dca615e7b8b7d2dff05b94f32afd4e360b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a07338b11d12db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2276 2752 iexplore.exe 30 PID 2752 wrote to memory of 2276 2752 iexplore.exe 30 PID 2752 wrote to memory of 2276 2752 iexplore.exe 30 PID 2752 wrote to memory of 2276 2752 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fdb0ff138b22b1ee0b109cddac4082a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543359177e05f9e88f93c56b81d70825c
SHA148612c475a910b8233928d3e17a470fb3429890c
SHA256eb7c4497ae7d3debc062dcb68c2c9a88565bb2ca66e5d407f5d3df4ea12e571a
SHA512a907b2606988e225bc94a9549b0ec305cfaea4ce22ae8b0973f287001785f67e504468bb86dda6de431d7570acc80c5f32096196f4f6e706c4effdefe002d07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502dfcea51be15a908a9b5b0e7da1676b
SHA18424286b87fd4bc8c73cf474497a35b276489680
SHA25667a5e1bcb1ae4299f776204facd0bc9fb8d18d90b67e10329014b0edce8e08e4
SHA5125d8015d668efe82193e648f9f0711c99f5827b2e6ed9f9c8272cd8a9ad01d6dbe734117144426ad8ac4b852aff452e1bc262ee2822bbc3e7a85f6088d9dbff0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7a206ec0bec3d2659b66bf89638958
SHA12a46daa5a413994ad79beb7ffe15b3c3065c7b7d
SHA2565c671d1fa596bfd29c222348ebd95c7d1edadb75349fd4c1aa01f63d6ee632c7
SHA512c607ba7197aedd6181f72221b3d88b666403f35a0d9e2d90d91cb42726136b94d8469226a5cb1faf9ee4ce06c852b593b0c1c3223d089e16484d578acbb9b206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8d67c8d9958cdab47a5bb6cb6fdcc1
SHA1c7f6f33ed3cc552a47537048a5443a4786473fd2
SHA256f1dc8af8a7b814feaa5610b1fa7074790a709c6f7f3b682171244bf7deb76e6c
SHA51250664a681d67e96120a1b4045f9ae875fc8ff7bba2360e0c4de9478ebc62e4bddbbec3fbb1dc48f302e9f4d8643da9ddab54b0d2f4ab1aba50748f5a31ed6442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13183de5fdcf6de32df197fd7f3d1d5
SHA15a0dc940b590197111121d285ae01ba8c5753769
SHA25653c0491de59875bb0a712a938efc74d5e51380df52057210a3e99cb325848554
SHA5122b4bf09b902aaf87546057adfa19eace3c5eeb876ddba6bc3d43d5c95ccc7bf60ffdcd1fb424acecfc5ccc291213165f31eb94eed453847d907def923780f401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926b291d4feb67e59023ff5b00860e1d
SHA1578e8114006bdf5ebe41d118389781db69b6b00c
SHA2562d78c6771fbb9f37376d6e53cb7d8ce522a802a0eea7c267067977c0674bfea7
SHA512d87b8efba9060cc6c14738441df5713df0330f7f786c7c4caa5b2b42b8ae842f6b48908c6db9c14cf4f207ee3d87d5d8023c2200a4ac177095465cb5ed557847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b837e8e1c04d7ac4dc2036d3f8bb3fc1
SHA154e3be554903c0f2c00364bbd70931cabca981c6
SHA25691c4fb188b713515f55e7177a339a6ff0ea55eca2132490374e367d9532479c5
SHA51241a3e3a0099059887be7fbac83258ccc6613a3cfb303b6bbb191b2f1d3e8f149ef807d355b73533c0d59255f01130696cf20d2b17fada8f818884c3886e8724e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b258f5bd50c40778db3e666d037e956
SHA1fa248b50fc6f14e1451cb03cb48bbad5aba2a7d3
SHA2564ac30ce759001f6d3f443626e61d5ad58cf08b763533610b66c5fb6b9ae60ea4
SHA5127919a1fa1668a523dacac1a2190a343288632f70b310baf3fea76f92ff8397108ade285d9a68b8cd69a50ce320cf1a1e753b968be011ba37f848d28c37478a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550917c93b59c4fd143b48ed74dc56e6f
SHA1e889b657f660fad6066251ba5e1345e9eba619ed
SHA256ef54e2a5f02d0f117ec4aa3f66ecb0605a5e61789e2744ec68945134f2f48fe9
SHA512aaba2d09698a2adef70bf90bebe6759e5ed02a0aeb869abd4e2c6b795f00333fb9261878a5830973dbb1d7e92d43647f76f109491d48f99378aba11ea14fdf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b4665518e5476a309ad0f871c510be
SHA1e751386df8dd54a391c4bda4fd5198353f7e5381
SHA256d7469ba7d6a94ade9b4b70417d933082a4b3d640635f648b2f0e51c3f773c0c8
SHA512f3aa2fcd8f8985b165fe92ab0fd245c6eedb5cf545c1c951e9ea9df1c669d4925267fdb5861aff895bc179ca5ca2c3e0d251e20ab189d7cee6e6345dc57f398c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1c7a5da10ad06313c17980ccaa6fe1
SHA1bd9dae40872a0cb02437da01f30f460016724e3e
SHA256ba2e4edb02ed946c0eb391e487c1a88e42012091d49da0793799370dbea3bcf2
SHA512c41b43e7b43f8aa3ac5ccf628e6c4fc9fca5a37d4dc21c77d9f4d670e8e25faaf232c1b077dce94899b6ea1962c0694529b514be0622ac55fadf0cbb631eb35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd852d99cf3c28a06ff0b09d0d5b75a
SHA13c6463d50ceaa6d5f95699236361cc8eb8308c9a
SHA25665e62d0bb226f6eed132a991ccf57f8d093d3d03dcd745cbc2b8e7d408b9cf1a
SHA512998f0368172d9868207d8f25f463d9b41b757d3c7e9fbb254691467a29f21901ee886baa181bc9d545d02ab1b928e972d932d176804d55dc70607059240ee225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52035499b125270b7b70affa2acf207a8
SHA1ec7633271b9486645e71cbf3c437ca4e26dba04b
SHA256ae1b3acad45404ddac2e7a1e7bd5970ec585ce8f2d2594d5283e60e7be4e02dd
SHA512dacea576879c83ad3c29b07f447b8c247802f13b8e1370d754fa73cca70653a3adc19efcece286fbddc541006f22368c403abf30a3c88a17b5afc0a828748fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06820e2092a8958cc900f059c41a022
SHA105aa7b31259aad6f7ea7b75cc8c8082800bcbb58
SHA256b865df334a32b211202b0a1a8914e8d3497f19519b24199f6edaa3fc231e2fae
SHA51244badb984c43fd7014316439519523e019c34a39cc8354880ebf050c8e9a1345f6add669e9d24aa952c08ce9028d288b692f370ff74a100854ae74fe098a051c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa36ff41d54a73f16c15f074785d6a0a
SHA191fea74670b4234244b24b0b420e49ac5c81ed90
SHA2561b05cefa315c43f8d94a227a8cd915d6cde4bd803c7922bc116eb73bc7655b0c
SHA512b89b9c507ac4e806fb8f1e3d7a663275825cd6a90deefd4f7abb86b6dd850d59a443c3dba62c88ab0c307fe2066ede175d51f7aae2b26ac67be87746ad8805c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3fa639cb0c61f1e13a976444b83149e
SHA1a2d4c874a2ca469c7ea6964084c89e05ee3f3b6e
SHA256eaa4378c5e189b9c220ae2ead1e0e382515a517036db09ab54c58b1855694ef8
SHA512c74ff5241d9a75f0e6dea3589cc49ee2943fb3fe07d08b6f57d5de90b51d09caa53b73de539542206467e9389f204959ca51550c992da11df736e16b7574f3b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bbd7368daef059ce90051676da0c47f
SHA1c1ef6bd0b3265edba1cf7af7c8d301ad6ba21297
SHA256c305eafc8ffd4fddb6ff72c4c2932516ae9f41fc1abc9da462529e7db8065b85
SHA5121beca785e0cf1140e95fdde46711729460e252698c32029108a126f7472693b42fb467e11f101c6e94b635af451448ba56d0d52e3fede1cb7a3dae6fb4799615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a42247ca495b2df3fbddb52f941fa5e
SHA17b93ba7f05851ca2bb580ab21c61c945dcc8813f
SHA256fa196de6eade865753371e0d3aa99a3e3959f8cb96e40531a62025961fed9e96
SHA512bec80aab25fcfe115210e339a9a2b21203cd62b80c904f75c17b5173fc2bf3b76d1d49d49940b8a068fa812e25e2e49638c074eae59d4f091241ce694161a44d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3e58fdb418fae3f2569587d295b7d9
SHA1ed2a81a2e08a1b701d67fe41ec6576eb7450ad25
SHA25683bd7293c3e3165e81b86b77b6b57a0eab96974e62d07f2d652ee3eb2d5a9958
SHA512470c48a4d9c57b7d3405f98274f7b9c2de27e3427519376ee27b173e9b62c7c5d32b2900f556b68383ca63004a02b2d2611dd4a2cb5bc1af4177f9040da17732
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b