Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html
-
Size
214KB
-
MD5
3f9bdd28dc5ff16c16a9b75428499f36
-
SHA1
567696df17c3a0bfdb1a91867cb4e2fc3221ed6d
-
SHA256
5875cd4ee1f85801095858a720c81c0eb2d0e248f857251bfce25602080316f7
-
SHA512
dea9f0545f186228882a5b8411d637d5cf4f5c9926d7620419bc32616e1a0a7e194b6587f2b3e5329a66dbcc136ff9a8daf3b422cad3a1e9138ffad702ea8220
-
SSDEEP
3072:UrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJL:sz9VxLY7iAVLTBQJlL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7075191b641ddb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434981100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000003d54e777322a0c13e4a5f1056f4a9737ff22af35d525fa270e6c1e48433f11fd000000000e8000000002000020000000e71a769a42e27d47266fcf53970b02274d005976a9595c4f48326e050b54d1269000000037b41e43d8552d5bb6c1612954e58051a6ed8954f0b8ef6a18bfb8188953afd2276c68229a69ef660e925436fffb4a1cf7ed13aedbfd26514cf9f75546aaf308d0eb832c74fd88f1e0303e2f583407adadcd377ea1f02721a21a802109b750f9c93e35ded24743c63676632fcf84863af79c74c90367425c55b088f337a8409ebc8cc1b68da06fe8b8f307e6c169b4b640000000a03b99f47a61defb3bd69b53f21f0779cced00be430ee499c2349ea99d47562eec5d6dfff4622171fcfe86018450e51a90c959929c6d8105811ba5e3dfcdc01f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000002e4fcba6d7c57256a7e1f9903691d29fa9ade23806b764d2e32963509e948b1f000000000e8000000002000020000000a146459aadabb89991486f036e08ba6ca2b0f99296083955798921570ef89d4c20000000167462e1f945a9a3dee34da1d6de149f6a4cddb88df0c9c67985812d23cbb24d400000004c0f8f6d69824559066689525a2405dfd7eedcc81664ed5732011b2e47d1d9d655d8649c07183b5b6e5b5410c92dc250e53b07a6720ba551bed39f88ee3b280f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05C7B971-8957-11EF-A5D6-7E6174361434} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2448 2324 iexplore.exe 28 PID 2324 wrote to memory of 2448 2324 iexplore.exe 28 PID 2324 wrote to memory of 2448 2324 iexplore.exe 28 PID 2324 wrote to memory of 2448 2324 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eeaf3dd4090e9062a4340aab853bc38
SHA133894c678425561dd5309817c19f3ed530829165
SHA2561105efa018a77f3db4ab65afbaef278922e5e4a414a57a87a1752c2876954f4a
SHA51287c2826cf05624672c4d3782229d7ac4ecba491bcc680c55de549e1a093a8a6c6f69031ce0faa9b2b3dfdf8913e1724ebee742246d77316fac5881a621f9c82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f8f5197be3b7231d35810adc9f0f84
SHA14d9b694d9c7a69312d1847558328a70b60dddf10
SHA25651cc9cd72f65dc12477d019178242eeb3ab325a23011d3866fae29b78b1a00d9
SHA51237ecd1624a6098edce8962b4f8f6cfc85e9f6b4be2d7bb98689a0ae0d6e9db623b31f7f5ab7ce0463d8ff9043e27acf737ba7fe91a6678ba03954f6a2174f4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54483b4b7b4365a596d5d80edd06cce98
SHA18ba95862a776824e372a396f330e9cecad131f49
SHA256752575dceefb46a7d1f3846143dcf5f5ef20d3e8b9eb1dc72afa6d1589b8e49e
SHA51295e7c8c3367eb874757404312d5e097e9f6b031c573817c7841ec0e2f95270c46b27955022167103ca01fee8c2a5684025aa58ab4e750a9ca6ffc3ddcb45e18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a33ab5b97522aa70ccba9bfaf9c2fee
SHA13258e87a0e450842b63994160f35e0f6bba1b1a4
SHA2561fbfed4933dc0c7104a495b86eff5a7310d383a1bca47d922d1dade712901bdd
SHA5121bcfbc4913455792c9765db8b006c3315b7f927d1975a7b043282b893bfa087261af6e313694c33063381397251a46a84ca916f8e4eda0e0a2e322aaf6119ed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f99c554894e999a202627d811596a81
SHA15159eabd5f9cfa90862fa0253f8533e65074ad96
SHA256c87f0d765b301381f0234254e93f2c00ecd90ea08b640a48844488eaa6c21f07
SHA51208412417e0cbedd42b8e9b536b7e1337677bc896f0c54fe3b832dee716a7e53e078a00d9f9642b5af903f4da3d6f7c58f6cd26ec1a0a1c5d41466691207221f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f39caa8d39ae0c4701b4fd6c55ae495
SHA169b0c0ab99e0c28d81c63cfb251b5ec771b71ffc
SHA2566f4c73448878a075ded32d0bbeb146454db0961fceecae6e3a6fd426e37d3c01
SHA512183115f092cb9b3dcbeff72b5dfb447acf5dfec0d7c30f68fb8b96cc49ba8d39a62124fc6b86b74017d76a717d58be1487111cdd40fb2e346eb9b5ca4e80a968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53f7919f5f285b83d13f36662174580
SHA1d74caaebaaf5901560164d7a175a6ea3e1f22f0d
SHA2568eddded4ea3934453bcd4555113af7e43ebaef4fa72b1e2ca8ac245f858f8108
SHA51298f5453523be3686346adf17c17072bb695ccc5307251b1134a6141f0f7f6b28202d5d2e42d48f0584a4329723f58e4db4270ed9cb11c4af0febadbcd5a6c3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5bba65e85f0424d9be88052a2e63af
SHA15871ee126e27099c546b7334a0e7f65a41078176
SHA2562589ad4f46b1e950d51fad45333a1dcaa9c92929fed624c0e3fa8c1f38731cd4
SHA512c9f06e25c1b27869dd42fbd0d3939cbc7b23a9948dac3290f14c5adc7a3fa55886d435430293d061882a5e861f5d99a075dc85f6fe9a40d850207ad7cd3c9dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c86a08b64002c5c48e9c8d7c346189
SHA17381a84430122f38604aa198a6bfe43717f8f8f5
SHA25659776f5a1e0de6a8dff3d532bfe2108cc806be585488b86997681f5a9159474a
SHA5127e19a1244f60995f0edafab71bd01e2bb27b28398a6a2b1e0a17a34bc0d9dfd96a7541a2681a07b5a57926b0412247a972d109f56ee9af6d636b55dba7c5e61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde642cc51448e4547a52ad4a6c5d5d6
SHA10410137016481358387ca701e10424f4572f1ace
SHA25687263fe3982f70b3ce7d92e991146d955000eb1b9bbc4657135d9769ca9a2e87
SHA512035a66b4b551e7e64b0505b643863e3055089ced261891a7defef9085ffce96c732e38f9392d8f87a03d17dc24494cb2602c7508ce286c23dc1433af68d7e465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507794972c29bb89afa1d3a2bee73ff83
SHA1c602b20dc71ab863e50c5f4b8aeb9604ac08b146
SHA2567b2023b1aec403fe0e1991504736effa1bfb7d88cf7e851c4024e90c24aaae99
SHA5126a5adb7569dab537fce309ef43c75401528a3f1f9ea2afeeceb77d7fe27b50ab2a29207d65dc371f2515557326eee2571d32c5e353ed1baa72723bd811070613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1ebad4dc3280d5edf2d06c53703abf
SHA1a9ba9089abfd69b701c3066104d98237f73ea711
SHA256663311e49fc02b63aa0559d791fabedbbcafc98ce76420741ed7115c27888f97
SHA512bd9a0da371702ba72e1f555d08f84088633a7064fe5d8484b3dadf155f6bf842315a13ab88128c3f60d6c0ed14fc48773c662720373e79a1e40f6417ec5f3b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f6649415163ca2b26d335f0436cf48
SHA12977b6804ba859700f5d86dfaaad5187d284d748
SHA256878096e5aff67b40ee39a61821783fd6181154fa27623c1bc1ddcb7ebf672567
SHA5128dcf34b7e9d9ad547e17f3de3ed982adfa266d84159bfdf12a9b78c6f3846f09185defcbb9e0921e8d82e372dd9c6cbdce1394bf8ad9ae6d1eadf3df2bac15ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eade92bbd3f9259a63e12574ca80c680
SHA1c6eb1fc5a5daeaf335bd5cf60e878c624fe6efc4
SHA256eebbf590d175c2619e597d70fb2ad9bd00e23c2663f5f6c9c81224f387a80c29
SHA5128924ef0f568134527d886f2190cb28eb35268a883944bea30c045ea4d1c1bdcb6b236ee533200d8697c0a20a8566d94f6e54ffe7428d9eaf3bd11cfc9004cee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c40e19a67cd1767d3a394cfa6f56cc9
SHA1588d1e41aa9e29c6826d70ace08c786a506a6abe
SHA256589281a9b896d4fdcaa6de4d587ab964f87d82b0cced35866a01eff7ed915984
SHA512b01516425f1cf70e89c0eca40b8734c4af2859ad04a5f7e3c13fa753e7367f7fc5441bea54903df83364403334adec20ec33695ac49657fcc275e7870abe951c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a162448632b4802361e5c98ac4124d76
SHA1b4cfceed17efaa0df5ea62ae905b1945ef04a5fc
SHA256edbcd9970450f1a5d1d84b8c35a7c53386feeb4d172d8a427ddfdf9678bc171b
SHA51251f4e659510d5821c87e5a537cc7218688e1eeee4d0075d1cf184a53e4ff2c96ec7e4622db334a1187a072c2d91e27caed7da9b29595c7a9f0b97bd22da8a5be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5cc899483ef636aa37a9eaf42eb9a46
SHA1207d1b152d3f5ef6e8007ba132f614fb9edfa773
SHA256e74d903d0b0105fc4c27a4f0f5e1ad41afce3aeaea21c32f158a5c193153b068
SHA5126ff16f048d19207a25254fdf3461e9418efedbbe0810d00ddd07bf0823ca8300e43e6fb765dee7af413b568ce2afa85483d2b48b5722f5c6954d518c195fbabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572aec515f4d7a3864ae78f96189439af
SHA169b5490ac1d2ef63027cbd09e4c8a815dcb511ef
SHA2560d0e02fa8841cd35e49ad6ca2a8e88b32caf3c1282a21c3bbd4577331dacc003
SHA512e5a11a6b5f78090b1a02bdbe7d85a6b186d35f605cf1fbe0a2eb6a4aca145b31d793bc271a93e1bdad05b9b4c09c5207f17dba3e07cc6fd65747fd5535b266cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f8d1e73db07b2487f1ebe8c007f1f2
SHA1047af926ecd50e1dd937790ec08a636809ce12b6
SHA25681b8dde03a26380e270129fc76aef6b00314b0cb1d4ca3065154434acf3d79d3
SHA5122637ce35fae995637eb587f2a77ee9f51c81f7548b938c9a7891f94d43ef2c45052dc77c0cc61a7aff48759e1d0de03d7bd9a9dc5bd624f61af6880682b769c4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b