Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
2d471801f572c813180d2f4caabb1a29_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d471801f572c813180d2f4caabb1a29_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2d471801f572c813180d2f4caabb1a29_JaffaCakes118.html
-
Size
4KB
-
MD5
2d471801f572c813180d2f4caabb1a29
-
SHA1
5b7ad57eeccd0a492cbcd95a715a56080a5d85bd
-
SHA256
78392b00a9a704c8761e27cae72a9fe46729a70ce2e5b802928b02fb3a46bae5
-
SHA512
0f69546a9e5f68774db22eb5c990013cab5607d4430d8bad54c359a3f68fa78d2b2c73c7f790501c7c6603bc76a2446964f6590ebb8e8b315c485c893275a00f
-
SSDEEP
96:x4C+tFO5JANLdCOo1NUX+4KC+bt4IiIqp7mk5NsW3C7rQvs8reGmHJ:aGP1X4WbKg67mkH/SkvTmp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000090f10ed1d4623b1032169e029b20d4c08f1c7963e0d3553cc546f6c5ba136eba000000000e80000000020000200000006adf77059a5ecba418d5fe0c60578db9153d8e6b12f7cc30a38118fdc5b985bb200000001853ea44f6f28a6e231361c7fe93de0ac08000cdded8eff784c85db6e3cef148400000001853578130299f46f96a69e61a885730c9fd0f82d6b6a230b0228ae80d2cc2b2bae624124faae89f4353eab416b6149cd858188d21c362686a1c8d96aebc9c5c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503ab36e7f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434663089" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000009f4d4b8a63d7378a1a6d916c5de01cdabfa7ea1c8b5efe0940ba81eab029dfa8000000000e8000000002000020000000506b3c81b32b0211814d86f81c4954f228874ea51060752ccf2ebb1a6837edba900000003465b81004110e775ec25f1709f9b16010cd877d926147a351018b8369e55895a089ba59c8441ddc6cdc6a93ed12634eae3ea118d6dc234c5d568faee040218a0c74e6c9b69be528c0bf3365c1fc96a3ccbc41c7941be1f44af094d442503767b08e14954bd72615d7a541192958f71d3a751539475f7979e6dd4257572dab06b20b90c6eeb34057a837d20b3ecfea0240000000ae60fe0450e205e2637b78b13af3729ee59d2f0464135e289e5004f5f4f64550a21638ff2f8759d3b38843cc22f5d17a40c6787ac627666ef05390d98fd16b6e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{985EBCD1-8672-11EF-85C5-7E918DD97D05} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31 PID 2364 wrote to memory of 2704 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d471801f572c813180d2f4caabb1a29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5294a094ab18e405176cb248406a117c4
SHA12b75a7fc33ce6a2705b7396c0b9c526457abca58
SHA25674f5e24eebc8cebee615285b2dbd7ce50d9864595cf55cdf9715ddad02691b0e
SHA512ba01f0bf46b22bf733b43018a06d2d5332ab01604b4d0ef81027bdac036417eade3b3216c4a71b7e2e83fe26c562b2656e7442da70a660504a2c2fb315c4fe53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5177b38059f6454e8e44ff42eefbde8eb
SHA146fdccddbea666178e3a1e90bcb3b28acbdf1302
SHA2569de3d296aa5ba198f295156d7fefb1f2018e3e33d20f076c22bc630692e088ca
SHA512b16b2f89567fc19110ea37a1d6b9c9bfd865be8bc924f1b4ebf6bf4e36e3df2b37f5ffaa4f689e14afd68e80fc17a91fa22abf9f640d1694be79ae8f1ad401ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594608bc56835c72ac66b8c4ed85af884
SHA16a729d4249ad080eb937eb6181d1e118e1541716
SHA256bb19973ed153e453b26ee2a3029295fbf06f41f7812a33b6f0160134de97c031
SHA51292f772e0874e6361060babf12dc1c5d67a88c91ae261256ccf292ce4eec9b5ee237f7ba1345a0a1255a6148d39702b60305eef5f057f362bf641ca11f548836d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d6569ab0a30ff7a99f564f5677a851b
SHA18f016377aff33502c75ab19835ef1be8cb43d211
SHA2563af1c3d5aa5ad628464ab2ed6c6e54ec9fccc0f0a91e71b9c4d835dedfaea5ba
SHA51214a9000bfd868eb6be87d918b92957074efc6f830d7d72da6d2e04dde71e32bb17fe2f169f5d74f479c2f446ba464e7e422c06ffcb6f459d079819745d6108bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57342027a4b3cc92b85dccd0a6374b1bd
SHA1a5b992a351e156f4a0cc975508d770d763fd7897
SHA2564294f23ab166958064bd7729aa533572213aed9b0ba91d7209bfb1a0e080bc60
SHA51238a82823f4bcedc2482b296f9de851483667e8ce2f1cdede85ed2c06a01a7ffc9eb86427f89ce12d3fcb5ae3dbc6793a9791976da906777e922dca0c47fcc0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f0a6746ebf5a89a1e2a1f454fbb2ad
SHA144c938c39fb50d00f2be5a36d4f7146b4c37acc2
SHA256b0eacf9a530d2fc739a79a1b9785805d02d27ec79b2cf3210e7fc6f6548eb8ea
SHA512144c1d4e88c2d337e852195d5854879844f0749b3e094c9423af215c50f6493cfc8b54d0f69c2f936743ec6a42ad76694eca28d65c0689bb2d62ed431ecd322f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dab1f3643ac46022187937cdd690515
SHA1592591082fe94ad1fb35d1670bd3b2f17becb8e1
SHA256b0556a8e202d16057c4fe8f01db808019cf17d54224dafa3ae8c7d9b9f05d62a
SHA512d32326a6f743708a07ecd0aeefd2ec2e24c2fab1532333016fa245d232f2c03eba9d098aaf7e6bcebb0000be143484c003aff9823dd4a189e98b922c9b88a13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59001e53948ebd1bd573491d35817fc63
SHA1bf7ac1495b7cc967157566d40e60006903f2d7b9
SHA2567bede8287c98d8b865c3c3a20eafe3675aeec22db99eb78c4c1e51b64cf00608
SHA512720ff2c52b89e09398d8696ca5d531709a7d6d433343de86177694b2a24b6701de6cde06f0859611ce95d45787c307015bf5a38194a1d408c123511992c15aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86fa71c17cf6cfa62fcb74ab3351218
SHA1db1ce68d1c3869823492b3257832b275a142140e
SHA25601e0fd92e223967482492086ec90d5a0917048734cedbf1d08b616177382ee63
SHA512dc642af7f7dccf82cffc68b72f61e85291e656d326b41ae96f90696f87f462a679fb9bf0bb64a22d0a3d59b7be6f4975cee6b154b8505fdeddb63072589f1508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614cd59598f30793c123566c1239fbf0
SHA1bea2aae81010344ab13d7296034b67ea3b735d7b
SHA2560eceef624a8a185a8ff7255045ba0f8c8aa756f78b87a1a19de639a83ac65fad
SHA5129eb86959599e04b5eeae5c097d29cd1f527a72462427f43979c3d18622a8027fdb96901c971ed0e322c59294a84446f857bac0fda4407fbc09c1578f5fc64f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253fab2cd4d72aa7f818ff578461946c
SHA119231865f97d821979e8f506992fbf6dcff7565f
SHA256427a1f8b062d4c3134afc9c7ddc9137d587dabbade31cc9555e2cf9c3d01073b
SHA512d0791acbb57339c5a73c92bc80b25bca83dc1fe726145f503e75a5812b5999a04515b8d12bc2ea1e8aed20a382bcd404440d94f45d45a1f8f0fd3e4ee78c94ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e3e0143279882671a2301c08485748
SHA197161fc3e76a233cc624a054e239f9718826a059
SHA256e0a70e678643bcfdead869368d73d7dd0819b00185fea324fee30753a534df74
SHA512d5f3e8be7247d796d7fdbea5eed8dd7b3565bafec71127068e4e4583051fac75431e72a8c5434aed0fb0ebaf272f79029d583ccb69a910dcc60e8b8b93259a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d34531f2d5091bbef3c44e03e63d50
SHA1f737a9ef1b0faf45d30a95b4ca8daacfce86c21e
SHA25651ac36607a8c1dde27bd18f0199467d272a706f45a0e0f71aea7f57beff1dc28
SHA5125fb917944972fe3cf78d2e92c0b77a63fa958a82cc692691cab545e06cf076591b2bb757adca448a51195e4d41e5a1eb928f4b50e5e476dd3b74d86f655c457e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdaa8e37cfddee92513825f6dc35cc6
SHA19e3d6d494be4c4e2e0ca039fbb95545fca7f1811
SHA256da5940d1f6bb396192e17caae7151fc0bad0e663725ebb098fa6d239b4d1dc55
SHA512eaa1cade9ae460e7a1083aed5685c942271d28920eb3cbce306b8b29990d9dc007212e15288ea21d314483b516142c893790efb5866544e45f8717f0523d2ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab248c84c114233a3e57afd2913c463
SHA1400320b8928b11e5a4d31b6fd5282caca5969787
SHA256679471e4eaa3714428be2b07d49fbb87840f35392efb75dd5229cc9377c16423
SHA51206a0063e094f7899c1a3a4b10d87b752285ddd01756b3a754041d9264272eaa8d586d3702b643712daf847de18386e2b8a84433a2fd8496eeaf0569702fb7d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d693060424857fe5b443bd3e4e2bbe60
SHA14ee0ba0b37ec797497e7119091331354639da455
SHA2561bcb6a5ea3766522d4f343c551b0ff0c21fedcee010d55a22ac20ef78789f5a7
SHA512c2f9d6a442351e5bb01121a4da751ebb70767949d49570ba6d0d3c0dff585c40c1e6718770b5776f96d24bea3b41c00e71599b7124d52e8358656a41628fa798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054573d370845f90c8d6e13d443e5446
SHA118a9dda30d9ce309b64180a51bfdf39f719463ea
SHA256461271742cb9b8b3d493cd6536b03057a0b9a9845536ae5bf41518c731dda429
SHA5121d5c36101e54a502f01e39c4fb0af09f4ce3ecb26f83f760aa79e813912c5ba2100405c77db3733faf70c0133c9a9c38f218d134b96f74c93f4dcc60ec96d21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50427b7805508e8497d7f04b479d5ba6a
SHA13bf038118bc544f57dd5c897c81fe2d41d35102f
SHA2567f9cae1e9e4bc749a61eb16838a1c85ffb0f97874054943617abaa795a42a036
SHA512888420c80d63a14af02323e763bf46ef8adb14570189ef60aa26bd28407f6502900fc8ba0c34c0f7de9af9f49d24515baa9edcc9e0dc0294d120dacb71636f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3e7ebb1c53fa00255490e80a8bbbcd8
SHA1c25eb0be68346b1937e559964f2238fefdead97f
SHA256bd51cf6aa7691146df25a3ef446d3a339b9a060127bc9290996964f88cb83aa4
SHA512a29cfe92306a2cb2be0b251c5593bac9d3cb2c27add4d3eae317bcd139d2d33726325267ffea8e25f17b5517f1bae3c5131a7e48c9ddb80ae7180f3732894832
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b