Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
74s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
2fe031cc94a1d220e4f8edf8ae16c552_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2fe031cc94a1d220e4f8edf8ae16c552_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2fe031cc94a1d220e4f8edf8ae16c552_JaffaCakes118.html
-
Size
53KB
-
MD5
2fe031cc94a1d220e4f8edf8ae16c552
-
SHA1
5c332d7c7e25350fac835067f2263fadaf16425b
-
SHA256
77c1bdb5bd84426c759840d56cad5b354d08ae527716021dbefdcc41d3670a15
-
SHA512
0766b6f5ab1b6112fa7380868960aea6808ca4cb62129b7ae2ca4a3339e22cf892793fb125c2629e2c23ee4d68621d07c995e87316e69faa8fd67d5230f07ec3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUvrunlY863Nj+q5VyvR0w2AzTICbbuoF/t9M/dNwIUEDmDZ:CkgUiIakTqGivi+PyUvrunlY863Nj+q6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434682212" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000a9af90b9dd560e4c8f0108d56e4a0717f4531f6c983ff815d09b281928ec9f2d000000000e800000000200002000000083e20234ef77d339c24bf21e246c749a56dddf6ef1239fd1b71f038abc5b14d6900000007a9ff1a6129c8f9ef706cb27b8cb92220d74d4ad4b73d3ceb053abd5ddc9df692204b8f7b71c8027967602cc342190d608184b2f613d0bf063328a6797d09d748722900a83ba1750d39d3245016d2e0547d3f506f277dd1c97b0e8b8d5b31629006eca9598d7c78ceecd5c37c9a8a5e26e8b94f069e4f59edccb52abce7615c32ce73e993c333d47b91e89bfb20e75f740000000e3e17de7609a7d85ea365768d63f42a340196620fdd7313d6ed3b3650ebd184eaed1d9254cd2d422aa660ed74720b5a58b9a01e35be5ba0682610fd0b5e0982e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F319D51-869F-11EF-AC25-4298DBAE743E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000ea4581408d4f286d4fd25329c7a6168ff15169e4bac315532524fb9de17b0f77000000000e800000000200002000000071ccbdfd0ae893d64f2de817fc31faa7d5253c2fcc247cf51997e21c3972507d20000000d31cbf2f5733d57d9a41a46a56de12efac51db24370aab4f47da0729be59a3d4400000006dc4dba502643c8af12ea3ed37c9c719d4b800f4afb620018691229226c05de67685ffc825c646025e9b688a0234b212136bf361874ec391f52e025bd383217f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a06f94f4ab1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2224 2268 iexplore.exe 29 PID 2268 wrote to memory of 2224 2268 iexplore.exe 29 PID 2268 wrote to memory of 2224 2268 iexplore.exe 29 PID 2268 wrote to memory of 2224 2268 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2fe031cc94a1d220e4f8edf8ae16c552_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0c689d03cc3892276d3c343c50d259
SHA15b19f111154c587c250fed6c5b0074b11b9e11ca
SHA2562b43dfee277cf918dab29a8bb247f50764abfd8e28d874afee58285037ef51e0
SHA5128ce50f3fb1518b4e7d98d3f985a9112ef2413f7a9ba64f5769579532c0caa0531ed053255a2a42270773c3b346fea65fd3cbcf822b41ccd4a578465f2946d26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d0f1c4802ecb269663f9d5b52f7906
SHA161ff6e9a821472b6d0e8b6fca9c52394f303b8be
SHA2563279d98df24962c3e5df7f9acafee16ae2912cb6e169b44569fadac3ef8174ba
SHA5120d39256081e8f9c6d93ec67455376b3c42b984ef50ac4c56aff5ff8e8d3a61067d61a7c2e7392894a3cc7e04097e98f49d385baddffe2d8ad258aa454768ecd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a3ac64f2c3bbed29f7a3d5b4abded6
SHA1e471a8dbd2b5abd328f31597f0c1facac3d012a8
SHA256c7ee685db4b98e589808a72310112da6aa9cbb0757b49fa91ef22130cd5455b1
SHA5123f428796d23d42bf369d5a203de4fb68878e06c66aecadab01532dcd04b96b4c85d6a71cde4f597e61a269b7a40b281cc9a0d625b096ab11161aa6d5d127e989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989622f84893a57b567ee8092ca4b0d5
SHA1690db62084c4b30bf97f619d2058b072a3e2fb36
SHA256c079a3d05c12129c972df8dfe2f4bf9ffd7110b2df590cc0f9403d8ab87b2f2b
SHA5122e754f16f3184082763b36ae4584a1b5a5bd707095b18c60f3b89299ad0badcdc1d83f3ec629da960ed0a21bb4fa9b5c1620cc2bf0c6798d2e6f3c5f1397323a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8ea64af811ddd21cd75e5bf314682b5
SHA125034422cb643634fd199956c207308405b20d84
SHA25681a2bb9408fde69f868ca7e953165b99dff3252fdc2d88a0223e7d95ba6f7577
SHA5122e2393c21793d1d03d6ac47c45e647d7bd0544277029d40f7cbe82dfb2c1243376741c40132617006816145b5430a6ca845845ffd9377b9c65681487b4648b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52591a64a5a6a0c0ede1f57b5c4f0628e
SHA1c4235ea9d46624f4801a6bab1375a904bacd6c9d
SHA2568602510ef5e73d1749aaca8d9a6181c5ae64f6b5ef2edb3af2467b94bf7b303a
SHA51236be1f360e5b548033d92626064e696eae357a82e6a87ab64e2298b3f17e2e7e6e6e97a9b68df101470787013d89e00bb6b61f60e9b9ecea4fa231ad55a10bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90713a9366b01283a155c15b695984a
SHA12247796d4ea6556b9b95813dc7b1758d43baf471
SHA256be69b8cabf0b1fcd049b6b4cfef5a9557c1e0c5ca49b4f61d19120586359700c
SHA51299dd94a2153a993b300fe90dbb0c63f3cd1744a77f0879d53bea4cd75cf48ebe6c1959b25a87358238ed757969e4d375f80bbca06ad6881ecabbfe30d6c00ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee71c04e8f60ce9d85435ca853269a6
SHA1ae20fa79b0ec73bde324974dc92a358c86a9fc4b
SHA25620ec88ebb4441950c04a546623c33f420ecf68300a42fdc4ef73c75fbdbd1ef1
SHA512bfc7adee420cc8e34e19853f24cacbad425b8c3c1b45e06940e8a8db1df0a19aa135d321615b3fcdc3896d21e28776dc6a43a34a374f8743d800ce8fee9a0a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e2175ae2002a28cb2ecb392151a397
SHA164d621edc0d2b7d047c3c4fed96f5e7e23faba0a
SHA256ac970c4bd9cfcca82c0237c08615586718ee3b36b0432016b602c719a33504ca
SHA51200d445b744a5e0cdbdb31634d8de5c66999cb2e5a1cc42f01ed7e5d0a06341ec86fd23e1981d2bdb83d93becb39be4d92180086aabc1c2f03f2e2f938ca56f42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a212c636212ec4a6976a0eb48caf68bf
SHA1f8fc0226bcec79d43cf7809e4c2cbc1b9b47da75
SHA25669116994c018186c234afe198b31e2472209fe0e65c5593e62abfea035f06e76
SHA512140d43e458d209b8ef720a4512607882ec71efab402f802e98219bf72841b22a7c44649a040bfdbf959e4a376c741d6efdad430555a3bddff8b471ef4ba902e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dffb4698b06f44d366cee471e9c0ab31
SHA1a527365e1ddc4fcfa50f024d24eb0822e2a834b1
SHA256cdf284684848352b9e7e07c86bee4f5d7cc5aabd8b97811984fe7bbde2c22f94
SHA51244888c8850e10514cf5928f60e90fc524490e80fea35f243151d6547f898a27c600de63c9ce5957a15a49d426d3d6036dce1ebefc2f2ecae3ba2d253cdffe94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa46caf057d923aea274a810a62b7c2
SHA1adf849221b3db123f2d34bdadbb7b4de62cf1a22
SHA256cd74bf3f9e2aa3d2699baf50041ff84103a5dbf207a9551a5208d3b052fab265
SHA51278ee6fb4886d276380435f27587051b87156e62df35a319f33133a368be699246e825604319def7fa462205bd8d8b4e9272af543a5e20748e3d8aca71b17d84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224ebed4133c8ecf9f0fc67a0f9663c9
SHA179ebf4d93f1dc0bd71f9f3a50d745e9190222e84
SHA2569a8e3949286c2347969c66a0da493c76a0adde17acb0b3bd462d54d55568a17e
SHA512ef075a0d9438480ba4136a4d76589ccc57027e5ea36df4519bf2e1ed08dfb774c371b82242531dec8eb6c58909c48470164aa180ca3281c9468f7a8780a0630e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5420c15b5261d1810bf854ba6ce6fc398
SHA1964468bbc00a609d74d52aef254c9e7ddd6f5f44
SHA256feb9fee4d55c5951d166f37cd4cb519571149d409bca109a37f2d18a50e0870a
SHA512e85998df3ece233604b9d6f3080d835405948606b335abd7e88a073276a1d3f782a2401343cf31c303a1841118f538c4ba0e8a5084003787c373292b7e563d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a766f578a5bc11b62417952b942a4bc
SHA1b4d19d8187fd8849fb3ca7308c317cc2219d3609
SHA256cbec9f0412c853f8b875d8997483d61fb88a33d30f0c5a38193fe01671e1f4f7
SHA5123a92efbe627b03a3c9c0abe69dd43356679a10295bc60d2dfc3e49280d9ea4087e9c10d04a4eb6c45178dc61a6df65dd9b8976a12204038486c0446b658976ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318baa50c3817221fa777faf7917c506
SHA1733ee1622c1b29848097b56f8fc40ed9dedb44f0
SHA25666264e916372d268343bb67653ab19300ece3feab6b88334dfd6445c22162ad4
SHA51208e3eb44909d2d31f747bb800989ac245f502338e90be0645939a627f3f04c7faacbca99898255575e83cdab7c23904c0a7ad216e5453983b8d1dae2a7fc5dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511d61a3b17a6467a87e2bb146d0d4540
SHA11be886dc5cc41bb7e07b249f9be01b8b41f07867
SHA2561e5f1fa74e070847810d8c80c5097eb27a50f5634b9db87273e1ae214f758a81
SHA512ac8e2d39acc3611a4b76924e0b4b99bb06e4bf3db41ac37c3150a047156b1e9afa14d6a34aab55b022bb1b7e480390cc5583453b8878ce0fe787a1b74cbe509d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c689e5bd7cb7271bc1094554e5014164
SHA15d362527655f9590445f2cd97eb9df566dec0e9c
SHA256a2c8b1b9074e2ae725828ff18481c86a1d0bedc8160753bcd88c9b7577c8ad51
SHA512eb255b7129950c5e408ffb07c01a8b3595b9162ebd3f602a9e1fb939341b14c89dd86f1bde7ea508f7d92daac2736bbf8871f091d26d10a8f95fb507b0f95d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4023727188a3c0e80c9dabca0a0fa8d
SHA17c8e666bd8f092b47b5cc20b210416a7df0a860c
SHA256988a9caaa88f7269c3bd9a739bb4b25943c236d6cd8fc9afa759778540389ef8
SHA5128585817293f6e7609bc16f3a8bbc21b8f63ad39aea3b2bd3c2c3e405bbc7857af2d82f4072b7caf6ec533d31a274a3ef04a79aacde66503feaa6234187c6d15f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\filter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b