Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
288802cba859f7f3618b8e566e811b96_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
288802cba859f7f3618b8e566e811b96_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
288802cba859f7f3618b8e566e811b96_JaffaCakes118.html
-
Size
24KB
-
MD5
288802cba859f7f3618b8e566e811b96
-
SHA1
6475ce9748296d9a25a371b034e23979402ff960
-
SHA256
e079ad622b3bb5b77bdaa40b1dc8675a681b0b413b1ac13b7cce0a811c993a54
-
SHA512
9db12159e800a14a78bc4fb6b9e8e3fabcec2197fa5b3cded80628e59f39143304d0003165357edc637bcff60c831d2f126c25da60d40baf65748d50476aa837
-
SSDEEP
192:uqN7HRb5nW7unQjxn5Q/fnQieZNnQnQOkEntFYnQTbn75nQeCJVevo7NtIFo+NzV:nIQ/DygcnnBC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000089f79175fc41dab260f545d110ae0270b5eea6a7edb5556955283c93f10512a1000000000e800000000200002000000068e2ae9e4dc7bf4fc67c1a317e94b077fdbb22be5203d88b6d33507e2a5e68a19000000039b534d7ab3277671980704c2f5244dfaf1cd639143b3b94eb9259721460544b0e8e45214883b9f66a7ca17cf440cf876a139db75da83c8231af06d19048378d39980fe00299ac94fe717f5664ee5c0cedf62e5612d6cb9badea4e778453725530b44d03bf08f929d9eb6493a2f4528c624aadd02e3f9d49fc380f6151dd74d30fdd0b1541f548fa37f6d99fd15212cb4000000034a6ecc69443965cbb297c50f9fa8e8058cef271c1ed42897ee72430a0d4bfdcdd505ff1abeda20e43b221358fc40f3db28a467c5bb70344e003530be2a024d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF3FE111-861C-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bf2e190751c44c311f1cd36da1f142a124478ad228c7e73a510d04e25dd09f61000000000e800000000200002000000030a161a66e6a50c8f97dd14e9955a5f64227fed3b833c36c64622dde690b707520000000bc941c68c4e7652c6bee5ab36e4e18120e39ccf2163fb80150a17c2a5c41895940000000f8f1237a56355a891b1548c888338f537d062def91462de229f42a2c27dbad8743467bd30b0c8296d1cadc92ec6d9247dcaa507d162240c842336a72668c1b4e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0bbf6c3291adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434626298" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE 2616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28 PID 2792 wrote to memory of 2616 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\288802cba859f7f3618b8e566e811b96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f901c8371f15984f1b055ff3ed7fa68
SHA18400f274bb6d0efe2917e595f666f1e07e2a3bb6
SHA256e10e354bdb04a9e03fee63198181d7aa715ec4092bb525af9235e827e59a8ec8
SHA512c18f501f70cc62c36b05455a37d7495d3648d125680b53f46345daff45508dcdd895697f893498e3924429b36308c665fd8a9865b8ff67dba025cb8fc041b5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdcca03f64544f9f0aba9c826975f02b
SHA1f4e4a5cbf4fe576d25cf9143fd657e77527137cd
SHA2563d5e27add33507db273f5b970812fdfce06da15dbf6c958493a76b491747275e
SHA51267a0f59988b0a7f6b0992e1c1af7734ab3944a4b910a4301b3fe9036e18c6927b804497fcfae9d6a592b255bdbd8fd3529f07a4c9a182f721afa46ddbc0df371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47ee7a4b7d95d6083c80f661373cbb3
SHA18091af18731a0d43a37a5d9579e5f5f7fd158024
SHA256f4816f83a464f5d65b4b849b4515dd37e51f6c8c5b8b452fc57f71925149ccb1
SHA512f34fab41c96d4ec7699db25640e0c4579bbf96a897d6decedf5504dd4433e11afac5f8309d9a37700013ae589bbc0cddbc9ed26c72436de0f0332bce45575858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7649dd5d2fe221cfefce906ecf3df29
SHA17ede2fe1d743aa4e5ed0f61be267615cff02e284
SHA2567c0fc62ea051da24cbe17e999db961896a77f4469c852ca2b9ad7e812f567691
SHA51225ecc096f6d3791374c400850de19549aba5e694babfde945e2f7358ec4efd12957e170d8a73f2ee05d9479a519709ce092452125924a555a6cceeae7cff4837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567299416f40c8cc402c924212cef0af2
SHA1c3438972f548442faae87cf2179a8aa11d4c3441
SHA256983cc3d64137acdc7ba7ea183a82d3989b7c59032616c9c11a8fbc507f27057b
SHA5120a13a1e28578470a7041a61b71abea2e37caa720b833fb657e9cc014bda1c12ff08b8f68eea0712b6fc014fdaae5ec793db5749b763419b79b67e33977eb488f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592da3c03350507cca378570f381c04ad
SHA19fc46f8715aa785cb55df021d9e720725a5d48a6
SHA2562e6f279705610731169963a241bec17a72c80ff5fda52327ea077f3fe089339b
SHA512f3d7c1b041940e10f3add4a583004a80acd6f53be4916a18c682b0784418db6673927d11f1e4a69a91194ea21d219d5c8fee7b9695107817debcfee5f5d1b217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521ab71c86e3421ff8b98ae61fed6ffd
SHA1180a4b2d53b6d5d58454c00acfa50cf61f6f7500
SHA2566ebfa2ba4109e1ed7696f4a523f3d74eeb7f9a34c3addb26b5e591de2632ceb3
SHA512bd916568acf4ad766541c575c86fb895f6f6c22689dcea560d18e22f0cbd28c8cde7c7470e6e6d6e9118bc7857c4fa1766ca74a98ba193fae781b1fd80f37f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a99e57c79a193f62cef409bcb5798c4
SHA1402d5b74c5369fc236572ed84386389e9908655c
SHA256e866961b86d888baa5e667f1e48f042c04664b661f0928f917b782b422804523
SHA512dabe0a9cf580e3de696775edea1900d9224359455f011a2f8e6cb099851046f541a86e3028f106218badeaf42438365a788c4f47f7536b9fb8c66567e31c4e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0898d89622e2d9e8ee7b5232ade6888
SHA13afda8e4846f8919418247422073716af72f068e
SHA256cda636ccbcaf66c531e6bb3f93030225ea6d8e3577ac568ea2ca0be8c8d2dd44
SHA512f34d620e818bf5f19c49d4372d16a5595d0c94e5a68aeef08066c8deaacd043a6e470f0f3487388d3773a8378f9ed19c0d93462e48204c695e0b89391692d391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577da2d282d3c912241b8a81410195f38
SHA1f85b039067d419f172ee866c3b45eb99a501bdbe
SHA256622bbd48db66dc650b7b9416473e1067292495510ccb7b035cd1ac4a347c095e
SHA512d5352bdb6965a6f8be3ad1ee6df4b10931ed310a4f23502c7f635515202ac9e6a24a10e65d48aaf0dd76c193ed4e53f34878bd4b76d38ea4b1a552148d49e2b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c36482afe8c5932bc9c58d496b37ec9
SHA11dc83e92f244282de1243543f30e4fa45be17dd1
SHA256fc943aab66681333ca23354218e3bc4a3593a232d3009fc038a0e9af202be607
SHA51259d4dd9ff14fd2298e599a8569f580973bc3c48441c9c32b6ad3893ea749a2f5b53c406c1ffae4d424bf5dabf03240f0dc52f53746ccd1707fb9c73d0965c453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515bca54e1758bf7ab34fc718d3e5eb47
SHA131822786162be6d386e49eda48046cda43667e43
SHA25659f9c426d2bc19ab52c3fcc66681f0c4b05a3fea4710d19aa97274add145ec8a
SHA512d074fa0de34d1d989ae8f398e9aee1506a31afcd2f406d0dd5dd7eb1bf73e5391a0e880379f354fa8dd50e794ebfb1ee9b469fa644540ba48b22b171ccc13618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8dd591d126de4aa86488910a65e7cfa
SHA1cf2d1728445971e995e0fe6b02f2ca6c8078ef35
SHA2568024651f91b3d0a02af42dea07066ee565a797b83dd1d472a3c063e0e46a707f
SHA512fb4a3a9abb562cf6b1395ebe62cbe2cd7bf37d9650f33e36886c0bf5ae1eb91aeb249b6f3eceb02943b89e631c7868e1e5eef9dc47c9577faf0f501d0bbb9f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539ca79bb155b4e206377a16a53bb78c0
SHA172076e2c53984ad00d0d23c10c9a176f757e586a
SHA2569409bbc4292a3e31e5b1223696042771a6a20f8e4f168008aba6170cf8432b1b
SHA512b200b2fa1cd211524e2e1ad279613afe70b32504adb35875761990c155e1f12b7b62b4f5d333f089000f132f39648f57e32227b88f94c35a40b2426d95051b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f055b60ed2397811808d09ab769065
SHA1fc1ddfdb4e89ca39299a32ad117e27347c41aae0
SHA256dd1e74fad2ca1b50baa55d9219d8cb084a8ac155d82c52ccf637932e6cc6461c
SHA51277ce5227a81f4fc57316a242156ffc7d86ce91e304a0ddc78d6686161cf5734cd0e5b07e0e3ec96aef347dcfe116771a492147b9bb44798bd351bbc261052806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae34e68181b73320c155657cde7d794b
SHA1895d142e958a77bf3543df7a9f02372d27fb8652
SHA256572f4bbc05e56b15427b6d0111ac9c20c1502e3305ecd95397b6d0857167632d
SHA5129a0be30472f563b88f56c803771ccd4efd2e0662937c0243c88e8c9860e79b0472cd3fe2d6671b4839386b539735845e6b86e48f18273ba488efb51ff2201f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508af440148dc52bc3accc4982e8a11c6
SHA1877a3f05f77142fafac7fed2bac75dcc2b459e1a
SHA256cb8e284fe29d37bab7ffe4bfa89d66e85fc912fed37c1779151d2ceb6dad334b
SHA5121b348613e5e652c4e5edb862a0d0bc837773b19397c6c5bd61022fdecbdb90c3a7d2c1b3662ae43923d3d97d079280f1bce40090f3166a848a8ff2c27172fd1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b3fede9b65edea1ca2ec7d2cdc56b2
SHA106334b93aa6e09edd404b02e265a8ee2dfc50985
SHA256bf3efe9968f3862e104d4a207fc6e23188c587e42f5a793313a4fdf7e79469d8
SHA512ec0804d2c3a453d241f4752b24278468600ae2ce06113ba2e754e66f8d2154fbaedcebfbd33640e4ca32e7c30efc806739eb963ba006fcc4baf158b4c5b2866c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fae3247a4fc9bffaf8982e08cc8ad44
SHA1538a72a35633fb239081aebb6cb0f64b9a18279d
SHA25638924153078a76c450d14f62061b3019f460250b54a2582881c1e5fa5b6d12b8
SHA512da3246eef939c4ca99957a8f288c9437806ec5b0b7cf90a43065cc131bfacdb2d04cd5ead973b645f9f796daf3fbf59a78b51307c02d07e27441f59d1f59b6f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b