Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
07f6a4f6de1f249d028cb3bcf6b31382_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
07f6a4f6de1f249d028cb3bcf6b31382_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
07f6a4f6de1f249d028cb3bcf6b31382_JaffaCakes118.html
-
Size
10KB
-
MD5
07f6a4f6de1f249d028cb3bcf6b31382
-
SHA1
580537b53dc12a6f2ee47f11219b81c2d552fedd
-
SHA256
dcf58b07dda823865983090235c36f966a891e056565ad892c78235fb0d33853
-
SHA512
c793ecb8839244113905a3b48f5f1706ee0a9aa35d7b6edd4e0e4d912880a454bd454d0f536491339427cb4340eb5a192728b8bc294a3656c00d4473b2ffa7ab
-
SSDEEP
96:cTtJ9HQOjCbJcJJxJcOq+J2bkiJJgs0Jx5OnJstFJqtJOQxVF:cxv2grfkQz0n+QFxf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433989108" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000082ce5bd8a4c0839519625fa8cdf08ecc2f1c8cf678dafd32b192e13876cc587b000000000e80000000020000200000001279d6c013b2c8a3b0f4e256d09092f24133acd084c74bde38c327644174181090000000b6e7f340b29e9ad7b0b65b0a0d010696f77e3e4cf724dd7ce4d4384b63c6d0b7c0f331f875adcadad8ebadc28c3de7b5c915ba1ac6af5cb9e031b45b383d76074bb6344bf8f50c6947fa7f35feaeed9ebe85e267261185254c6a2b302a5fe6a571469fd3258c3d6ef8bdd60f632690c679b11a520642ce4234e460bdc24070e6356eb66c5991e93dede8bf001fdde0e14000000029f8f01732fa1a522c17083821aedab5cd3bab7fe746627c58a3365f2a7b1f25a497fa0982eda51160ce5b15a42f432010e57e6a0ec9bf2c52da9a8fd7fafa3f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C659451-8051-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50170e315e14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000032608154d50fc50d54e1486d7832820fd1b8f4341d343e11a55aca90f344f18c000000000e8000000002000020000000690ca46907599c8c33a0d0476407c3c8943658124202b8d6dce63bdbefc57d80200000005046892a769e7016224e55534e60df814b53ff1e3b131edd895dbacec14d416d40000000e1a8fb496e88340bc7a7c206f202908ed51ce7e8dcf0a818423f1858b3c6bc3b175132c134a23b7518b6da269329bb51e5d12a4c7c2951e84e563e40e65c4b85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07f6a4f6de1f249d028cb3bcf6b31382_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3f1988d545006bc4247c3cc218e463
SHA14de8b39637e6b97fc144559b3d43ce77bf5bcdd3
SHA2568a69ea2993c30d42011d83caee8b7298329345b14ab8e397d14f917d1f4d1e3e
SHA5129ebacf1207d9ddffdc406b5cbb5814cd779e1c31bf06531402d4e3f264aa849ee70b5f103b9d2c081f621f64e2d93e36748e3eb9f8cf66f61bf2be2c2e7ba21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10c2d2f37093eacfaacf1d56ef6780a
SHA17e02ae50d6ae4f9d7c1daa63ba6162a681d83423
SHA2566ff3c18da53407efc398bcb2ebaaa935f903f42fa5cdd5e0d76381e2b0a65862
SHA5121e25ec134301902195aceb3c6c39a1ba79f191de47242afd68ae947b06e7fb90d84d6675f0fbc5f912a847c249165a93997f0dbc315cddc81acc09f0d2e20ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553aea9affd0e196feaa1fbd254f4251
SHA1e1d195b6d52c5a0f9a2c7d64201c0af369e425b6
SHA256fcb861a5eb5863c3b28df8290593ef7dd057e3f51d07d1fcd128a03e5fd35ac5
SHA5125a592f2cc276162c7906a476b9cc1736f7b2f7e2ce40762bfd16904aad0a657f59d807535c06fc8d495d93cb7342c84185c89235ecb68301a11d785f38977199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5b94d1bd417cf2fe9fcf71ad5cadf4
SHA10b893af23250c059038b1ce1264cb0b1fabcd953
SHA2561612377d1e27ab1018638865b34250022af1f54985549a866aca672660dd1c95
SHA512294cf0324d5fa5b74370efa5b94a3d7cdd4aa806bf05d849a690fad8ed6c74098f9ea6a901df8d7854fb0affb6a66b9ebc1d952239bd43096f7d354f4f88b7f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfecd81bba915b863910e60b527eb8bb
SHA163a339b7fce9d413ce2de66a1afe8f2d69364b69
SHA256a28165ca4db4df4e52ec2ca171663e442635ede70c5442a1b917245a6aa6a6e8
SHA512897e9bcb3db03dd6f309ebf5ba1f4f7d0a13edfd3820840526483c94cff79e13ed4a5fdc4633a6e9a4f79db0f200592300d2b3ebdc590b2b3f88fc6835bff719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cf07808f59cc26c520563dafb33cf1
SHA112b6a0249c4441194278e2af557b8a9283daf5ff
SHA256be0c9703fea53f82be49726035c9b6a4150601f0d31afa3d685f01f90c31c3e5
SHA5128f1390918eba76d57864495100326afa13b0763979db21cfccfee78f43e65186865d612b5d49ebaa921aea734231243908cef4deb3cf0e7168373e3694a84cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c36bda37ddf2d031ccdb20deae96d3f
SHA17cd1a460c6021c5c3c546f1b068b500e377178c3
SHA25618ff704b683819c7ba277588dcb904f276ab57ea9590ab3e1b78b36181302cf5
SHA512282e0ba500b976e1d80930d95e8c62f71b1f24cfcfa942c8868ac200deb3627392354a9298bbecf44e826d4c91fc0140b3ceeb8f848fd3cf532d561a395e4288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb4449e6f92a330dfb329065a51d3e57
SHA15ccd322b26d4b034b70fe3603e7ecb35df5364fb
SHA25607b7c6580115519350cacd4ea0067382059b0e0ea647613c5c1de832283bd548
SHA5122c0d99acdf6bee00555c02089f25b1ae4173768947277cde2e711fbd479df0c8d13e0a703775dbcfec8eb6d7d9eb6ba42bb91dead1abb01694bb2a3d76fe1508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58405f93247d77a2e53707618a70d9dc5
SHA12546ce40f42714b73dacab2aff035d9e30a17db5
SHA25663b74d92b6aa1c8a25375f09b5cf54bcfb7ec182e8cea10908a76b727322de8f
SHA5125eddbeea511aaa27bf965784dc48078aefd6a273781cb0ee12dc43088a51f08bae4e6143bea668caa8425515fa82d488cc979f64251bd0ac9d3b8358eac191c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bf639510c207efc30ff01c3d1f4ae59
SHA13b176f9aa9d5490392497ad61ab41bdb2b69efd2
SHA2560e8ba3c9ab8022a04a4b58e80c028d8c6f5b26159d79f041b326d00735484192
SHA51229f36b0ba9abcd164424446aa1284224720c1164583cc9222ab06c291cb5750cf1afcc3cd136abe9ced3a529aff3305a52c59de21e43e570ed81f265ddea34c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba564889f3476740e40e1c901702aa12
SHA1a259e78ef1355dcff6a61a5c51fff2a59cbd4129
SHA2568913cb008d1ba7f1d0d0d06a00d9fef55c47bdd80781adec3ff77ca238c90de5
SHA512b62b71ee1a357452c4cec6b4417004405e731ef4c43ec64c7844f18f8858cdedf28e74e894bc63bf7c11e11004a125caa8c3d2a775aa854a68c0658ac5c317b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57771219699bc797ff51a574fedaaef67
SHA174120266bc3b07710d63737513787f9cc73479c9
SHA2564e19b4149bbfe97a6d5a40e762cf9e02e14d4490a481a43eddf08f3bcddbb10b
SHA51287c89a11a66908e9caeefdd61a4b9f495958e007067284e0432db2ada9ba7e16757b1eb06d3a8bc15485d5eb9017ffd347d2b0be4529f62e8c098dbfe052df87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f6881639b6a1c1a680282cd9fa36764
SHA1a7c7b03b7d65e198a85d3ccaacc6e91431d14810
SHA256c14e41e7e397eb9081d04ef9236b80e63b56be4c5751a3bbe6b20a9776de0f61
SHA5123250a8932fd1f0ec42405cd6f84c131915e0aea4bfea06ed76a239197541dc8c14afbe6ecc43f418ee6ca2bbe557350d42d4d2f44636f6741ef06bafd8201727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540948e8f5828af3c7d09bce47b22a8f3
SHA1578b7f39bae4d1aef3a41126081ccf3c766d903c
SHA25631f158f37dc25ecd7609f847f7e71a1cc0ef7a09c9243d5149ca6b92c7952516
SHA51206cc89ad6e45146604178e5d627d8bee376f3b49552eee42474ef61e6afcb6af3c8fc6a78bcc7e937d9db4f2a572ad5d77ce3749dbb3e910a0e624f27ed648c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501571696dc074e7312cd49ebc2c7f2e8
SHA13fcf1218e77ef3c63431859eefd8fec6a9f71ca8
SHA2563a8b48eaf5a824197d04c38d6489b9bcae33db88f7c89761120ff7d7e822d6f6
SHA512eeaded9e90d8a0ac7162db9e0ed97b27f4f005a66477797240ac7be9145825f9ee98972a0ee8385f514c7d0d16852cd59446d1ad1ca371839bf6e84d7e76f253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cb1f6e4010b7fdf5a6d00f8ddf0e726
SHA1dfc5950b4820f9884f4158fc0acee359b3f50b91
SHA25626cdcf2950af78c92721c12b973abdb0a179d4aa171ab7461cfb77865959daa7
SHA5122b304dc87ec6ab36c50d8b8c373220ada7f4389e7613e247249419cd466ad80566976c602c4d5a6f4e712e9896ca8ff0276c570e5f0f16138acf122f10a9a3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b549f94bc9daf9ac8e3cbfefc221a5b
SHA1d6af175e6ed660a741149ee669b2afb58270b6c7
SHA256b4240ae4a61d2bf5197001c1c3eed648f9ad6dbd28bbf2d903bbb53994c45ad6
SHA512a9232370c6961ef9109f773eec4f5c73e058eb0e7e02063b968377c7da01bc4dd51ba302f2bddcc10852b3aa3647a0cb48e868e199cebb8027c0024b56a88c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac2522416315f2b3c6d54bc7474cab2
SHA15909748712a66140a5495fba3917484d33590678
SHA2564a55e67a61e57e683cba46224612e128a6b5ddea1c7e68c0dac1ec5d53553899
SHA512460028d32130871247a31698035f3383757725034afe360074f69bb3291d6bec2d9a9721ed5f9a02a82b26ff3f6efb9bb313aa50295348587ed61d3669483ae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58965f1e5de14998bbb1575391c952a
SHA1620cdc1ce6af5d35c3a339262e21cc4566420573
SHA25615bbce2afecd946e275d8984f4dd24df8d11e991f60a22597005acf9e65f819c
SHA5125d7ebc5a4ca681bc4ec26b347bdab9b8e02341059fbc2611b2fcde4e4e03ad2bc37c7ebc9a36ed101b53b5b2c6ddcef4ec5e29db9e61a7259b15b74cb606981f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506be2230adf77c386d339558b90cd4b8
SHA17ef7e693605839b08638873586a21f9606058b41
SHA2563779f8acc5e66ad6af966fa69a6df625007dd2cf5bfb6bd1444790896cd6c860
SHA512c666324cc6ee7abfdd39912504e2b3a42dc8e9eb75a6a32b33dd5a060c1c466dcf9a763eb5079a794572eacd33f794ab6946a9b090fc2af7f40b7ccdbb83d262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be5fef076fc4a52e3359c7e8cd9a3bc
SHA1ed92b9c8f86ee0d097a427a98e9ff59598cc12b0
SHA2565ae60c172f2c1a0e2f24595124dcedbe6669c3601e3e071de0a275ec3b50a2c9
SHA51286e2bb0201d70fad0d4c1592e1bd92d029c0b7b976266a18b6e9a4ff2a93b32dad5b5735b663e6e004ef97739022744822972612c648f066dca3634cb30aeb79
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b