Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
3941457a274b2a58b78f7edb9d9688b3_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3941457a274b2a58b78f7edb9d9688b3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3941457a274b2a58b78f7edb9d9688b3_JaffaCakes118.html
-
Size
8KB
-
MD5
3941457a274b2a58b78f7edb9d9688b3
-
SHA1
73d9fbde3ec258f53bd55584fa9bedb774ff034f
-
SHA256
bb85fcff53ae31f1d7b5220d4b3b87ef19add1716411b8161f0323d989420bdb
-
SHA512
3318571fa9f865855c5585a1c98d26d3f3a8a13400983cbeae302e3be62190a37d173dbbd12fdcb0e56b9dd1c0469a917b16de64aa48d18b20c9fdbc25c3c8b4
-
SSDEEP
96:uzVs+ux70+LLY1k9o84d12ef7CSTUIzfs895DrHVbfwCCfcEZ7ru7f:csz70+AYS/qb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E8B58E1-8879-11EF-96DD-F2BD923EC178} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0efa864861cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434885982" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000aafdcbd0ecb4a08f249ac230f22e77ce500dc21fd9e129b8f71cbbcb377191db000000000e80000000020000200000008e627be205e8f8e897e28ceaf51ed13feeb52909573c2b55d3cd7aa3dcf8c11090000000c43edda38a3ada0f6588be6965d246cf63fd25bb914ad43ca93fd5dbf5439a93ce30fc9156849f04d1b647c4ba0c155932963c272f854f531023cc55959b7f8c8a125fc8cf4dbf1ae5cb66b63746fa60a786d77f3c45ad5ba32e586c1a4a63c1c3466d4467df2dda77a54a20b6ffa07a0cd93e4772e4f883b86ccb71b90074df9ca760ec3efa6fd981072c08020464f14000000087d5d92feca86231b9ea4a8a7066f989204ce7aceb746a343d512d8494afa099ce6c2d14618c22c52c8f674dab0e2ac56dac80d2aff378b39c45934ca1be968a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000b42c16d4059e19cb7a009169f8ece152a3afd345de110f57528c88e1bf6889a6000000000e8000000002000020000000897749eb108ff6b738d014e41edc28ba0a2b27a866c71c2584e0535ee97ffade2000000039c2118dd0dbcf70880a26a58bb24e798cb521468ed950304df081e2251a5cd14000000042749fd3050e292cfc8663abd09a015f77588ced1f30268a059636da80762064a9c4914898c4d8964a530b2e30050fc6d16eebcfc41d8ae8ab8153f21eb2d9c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2948 2376 iexplore.exe 29 PID 2376 wrote to memory of 2948 2376 iexplore.exe 29 PID 2376 wrote to memory of 2948 2376 iexplore.exe 29 PID 2376 wrote to memory of 2948 2376 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3941457a274b2a58b78f7edb9d9688b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e74af791305342fc9affb14d63e18b6
SHA1d05c3025ff6458dd1fb0df3d194caa6793a23184
SHA2562db5a6524ebeb0de8e95aa725bc0fb6b92dbffd1d93aca6e741920169445e4e2
SHA5122a3408a488c150970ecfd47d8ef9fb83abd3c1739c35cdd9ea4d72f2ed8b54bd10a6279f797d380182d70dc5bcf605719a29fc4749188fe81315e38949867dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031de0fb9e8f4c8b86f0d321e6ba1502
SHA1abfb1491b3c03b2da1219e5c68a7687d55a12823
SHA256be7ebfd34bc1cc9d3e80bd0c16c5506ef2c1318fda3032fedc007afb0a58e74f
SHA512019b0846e1df1674f631093423c66d56330a844968bef223bc791653381e5d1b444ef774e786128a58dc22029741a1feae335285ae3be9db25387df3bdc5928b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508b26347aa8f9d6a62c07333295c802
SHA16db2e0d198ef3d52d8b2e76a6096c64b593efc75
SHA256717c46972ea2af24e20214f9d3f3ca227071624c2603f551804bbda444def680
SHA512f4ee4c3879133f968151163391d0b6e365a0a5a8506f302b76cb7f115b0e863e5f50573c8743203f3c847fddcdc7556e7af2c75affb0b207f233c4b8caa00d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11dffc8faf475b01a88039a9a3f4836
SHA1db8be56ad67f8cc9b0ce9b91dd7e7cfdc8a8bc0f
SHA256d4bae88fbc491bcdd79945a0eb218f51762fb4a8a0ea0478ac29f8fc2611c1ab
SHA512cee278b536c5d2091d84509278a0840396379f25cb3392a883e8af7ab11d0e80c87ec0484789fa866e890fc377b1a1b8225caf37a1a604da338d0dfcd0a23fb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2be4481fdc84abb93885055d98e2d1
SHA1c2318d05a96c35587f6d96cf2c6923eccb958122
SHA256baf04e589c011ab964bfcc6b8597c2d3e3ad5da6f057beb50aa3c36a666a6824
SHA512522d3ff4fc49d7f4f818bccd912c556deb501f6bea393c46ee5d00662d5e00561b03da7a0561a4d9afe34ba217dd67d1625ecc5a94f4e9b7a310b5fedba23627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d1ec61d6db81fc99017d59f786cff0
SHA1147d403074167cd38b513b39d010c5b31cf8b245
SHA25641b75120bc8b66517bf099269350de9ab1cee19efed6f90c0a54815cecc0821e
SHA51285e0349cc36f1eb20a9d1fb392d60f6de98e32b77f39fb4870eb384d7b56247deb51bcca70b030e3647639b55bc3cee40e47b463158eafc57e67ca0c7e71f576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c86a2830c043f78ab9c7826f47eddde
SHA1d33764e927c2a39e945439bd450a5084827900c6
SHA256d85b9d50e9e35f7800c5ef0ffc1d323a250995b6114009909470c0e624061a3d
SHA512a60bdced609a09da4d64b2546d75fab092c0d62d40c44c9d2d66cd18d46bcce6619ad172dcc20d9fc4262022e024cbcf22f4d9ac4a6a909ec8cdcc748ed70c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca4af4aa035aebf9b18b2bf3e2404f9
SHA1980d1936239a0baff3247ce1aeeefc6652879840
SHA256eee113f1804cf6b8403794f31781bd3ed97ec7d61952b26f8cd31b5b2be87156
SHA512c0d9d7fc0b34e5ee0bfab6034947d7c44006adbce20113812d29eb9cb27f72eab2d33ff4277875fa04ca417bfcce9cdef5b314a7507b855992a84d4097791097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206fae08a4debc964f783d3672826271
SHA11480ce6eb4e8c07ba395d4e94c841d67f31dddf0
SHA2562a41dc2f44c27718e50a087953c39862ee4893fcc952122e7883f7fa5bb6d828
SHA512c7b24d5193682940634d8c0ee222c86d206f80603aa5afdacc32fe442da81a5bbe5b3cf457c8520997d5d11e4d6ce00c77972751ace6f016a5b8aa3e3496676f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cfdcab0879d0d1bf986d0c846c43794
SHA12675ddd9be421253a6ab375fd86fe83da0c5ed5d
SHA256ae3327b40075ba800dbea548e5d64133b8d1758c0f506014fadf8283e67d63cf
SHA51292d39ab6fcd12b6b0d6e0e2b4ede360862736949e9d8b686b3182b363477d1625b7729cf7c324cadab0323f2b38b5b662909457ebd12a4962c44570274a3283d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523bc44f9fa29225c8b63364b258b34f0
SHA1c57287a99b74394b0e9f5a8953979d1b06453d4a
SHA2565c13073277736d5968c59e0ff93ffd7543c0e65e9677dd5d26211f70342a6627
SHA51220957153b92d04b6a9103d8f42e21038bbd3d01019b1fb5c93fad11045f4c0ef637b3d4dfb3305a35b890daab5651425a284c0d1922ffa1d2b59bf9033e5e4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7c2f864a5e2b2dd78582f0ac7b7355
SHA1c59ce87924bdd57434f982eee43552ade3c92eda
SHA2565387ba8fd9b868dd2bb7f554edca4bca556b9c7876900950a099af3e782f7d35
SHA5125eb1d8f7430e49aed65f44e34ad0d8d11c0e2742acedd1407c90bcdde6e2c8a46842844e9aaf35f21e5534e42c7a56baf4ebcddd860e437b57de5353bb45c982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5083d6696b76009c9c69dcaedb02edcad
SHA168a5c8732c0d0c0064cf3bcf1b973a275d6d8345
SHA256824683269b16bb9da0e9cb6464d7bb01926076fc30fcb1a4c02e3089fc96188d
SHA51268ec0d837a68b86e3af7c1c7f9645035ff8af2581422a8a18c9b147dd6a2f8eb0bbc26cefe7a9bc8c68482060650daef41cf005b13d63c91f3394099d6f140f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221c691751fa2d89ae51f53558544352
SHA149c11c1e2f57382f72af776c475d7604d8b72227
SHA25675f46cdccdc2d61d133db040bfbb7f342901e919d8fed745dfa795595d90da8f
SHA512f91b3be3602863aad79aa821689e14cce21fbdf977e05b29ba28f9b28ae364a92b8fb93530830f9475add8cf2ee7066b5af7e43c018f5a70020863275f9f7832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f5428389dadcca7d2249b2a56f8dec
SHA1e6dbc5cabcec02c38811cfd370578fc099f3ef9b
SHA256502bd15d13d6ab5206fb42da39188f2ed9c537bcbdde9f99631dc8f1f819cb4e
SHA5128d5555047ed3ba25ae08b46f2ff5bb5333b33d22f6b6818cb74cb462a2b33e8f7db35bec052c1507196df3c1ef81978537182d9deba2665102d659dfa87c7616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989ff1efefc2e4e228a366797b6395c4
SHA13d8739caf5b472a1723a5411863d5c0b678173e9
SHA2566c4cb5d57a60f0c8c553dc3f687198013a4007a891258c7ce321210e2472f66c
SHA5127c0cfb36f558a56fd4964d1df8a8bcd5d77105159422ce6322e62dc6ff8bece24faa0b29961aa7151816c49d53fa755838f996662888119aa8ed8d217cf3d419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f652e49448c112390cf87b1e070a170
SHA10790161ed23276e4b7bedb98f23101b973e9381b
SHA2569596f103f1f3b3950b37e9eb2e7cf8137ffe304e492b2ae25af7aa163bca6285
SHA51260bf6c1c8697c2ca50e3259e93ff999a0239a8dbccd9bbea14dac65af789fc3a377f9b47b217674ba699a3500d561174f21b6e16480dc85bd66fb6e55dbb7400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5642e8f0f578bd49b11f87d123f72a61b
SHA12e9d3015dffc23c6d4327e361d54b39f7dfd0bf5
SHA25602f128156a660cb8ef4170ea2d5d43267b29417f58bbd4503f84d4e9ec7e3a8d
SHA5122ec8326bdabc79f695246829af67e5882c0ab1e7e023b4e5d6c52f036505c50d7ec70e18af95fc353d18480e165233a9a464e7194d7d164c92d5c15f3104dcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d31f1ed00da6cdbdcd810315e2ee5d0
SHA11d6c8db00384ddbab2fe54cbd49f3cd57e970e41
SHA25628493777f6d10b0e514e9f564d1d9171470758af00a307b35deb88572bea8167
SHA51245a2d7998411d9d75c11802a90927386cb9ed54ad83635e3f1ab59501f357e3a95772b683f2b1040179601ab1215e5e895a50e051e0a96fccdb550931bbcba06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acdfbcef1e1a4cccad0a0f40560ab27a
SHA1a02f566c6c65a0227601d3f5076c12e8d3329c2b
SHA256b33e5fc44bb407df23117223bcf4db26157c4a98acd27a4e896fbe3edd76bfa9
SHA512c99abb70f5b58cfd85d40a15f9521d575b768d864abd1abd18b61bcb11ffb22a6f268e90c519e4103a5dba2d9a91020cda52a0897cd2eef9c26934dbe75939da
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b