Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
55f96f6c23ecd133b46053e1b99e4064_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
55f96f6c23ecd133b46053e1b99e4064_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55f96f6c23ecd133b46053e1b99e4064_JaffaCakes118.html
-
Size
11KB
-
MD5
55f96f6c23ecd133b46053e1b99e4064
-
SHA1
03bd3729dfe75f2f1d2094cac290675838807d07
-
SHA256
b26004bdf8c2ff2b8d4417be902ab7eea79a601b06f882f9b58abc0501d4a006
-
SHA512
309e1d4f803bd7ebb4af112ba98a76f16e05bb7035e5b3c77a2c1ee460136ac13462d50e3a2974203d6cf086015858e95ed5bade0f822440223e80eed192daab
-
SSDEEP
96:uzVs+ux7lrLLY1k9o84d12ef7CSTUbGT/kZ6pzeekwgKLR/ZGYhLd7Z3hlVHcEZe:csz7lrAYS/CmSnKLRRGYhLdXPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000008ab2f9e0d62a27af76c61d8379fc25ac6db243deb69c23c9579b1d7b58c7c1c2000000000e80000000020000200000006c03681be8a0b339ea7813952f8d6d4cbf4bc064f12486877baad6c7f798212020000000382a49d327c7c8d918e4e020f66380f67611112b6adb4d2ba25c460c42ed1f214000000004780e0094fa8750093836f344049c02333167b57cfe0eae267540705c2f0c97f2386a098b7df94bb6fa6c51289cfad2c0dd285cfc3ae2142bdd46cc6cc91159 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000087db863cfab3abbc8407b35247493cb027bf6ad803fbe218831ca38d010023f9000000000e80000000020000200000003039b3b3c30cbbf4d5734766815afdeec6fe5ccd2ce60af299ffa6ce91e70ef090000000b6d16d0902334a72291ab1c32f4c8028a9f1178c96b12190e5546a4da203376ec94316817ddb3446b53dcdb9721569c1eb94c55ac162ec66171f2c90920e95f91ec89cbdbb78695b93a7c15b9ee9b11b79ad5eb4ce6d1af753a2b5a4da3ee1ccfcd62ba8da9b39ff867df4a17548ad60b33b54d61b79b5875a6a63f0990e12e5bc6f4deb7f976b2dd9f722edb7cf3b6d4000000093093188ff2f5ae3c73e0df9f1941736af9ae1d75fe76405d3f95dffe9a46f8eaba67102eb8e35b8d19fadd12e8b989058967242c6f5d5e9e357efb71da7752b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5993D261-8D1B-11EF-BD8C-6252F262FB8A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435395276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e5b52f2821db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2856 iexplore.exe 2856 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2832 2856 iexplore.exe 30 PID 2856 wrote to memory of 2832 2856 iexplore.exe 30 PID 2856 wrote to memory of 2832 2856 iexplore.exe 30 PID 2856 wrote to memory of 2832 2856 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\55f96f6c23ecd133b46053e1b99e4064_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d544c397f5b7a719a3a5fd614f33adb6
SHA12323bc4a48edff2198929232e1e3b52e826b73d7
SHA2567d8be81670866c53157efae51c06c297dca2c953f41accb3d9b542469fc0df9f
SHA5121de8bdd4048f81098c0d7d1b25de41a18f934caa11bc0c13f3d75a8111923f6dc1341e5efca2438c6f74226a6a1a9b55b039b3877e67416c9e0e098887a50377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522767d2b6c6bac706a4c0b15fa070f03
SHA12321af337df4b612273b767272319db83f98d875
SHA256829b01e7ad69a235dd380e302041ca30b056dcdde12432ff554081e36e1e6add
SHA5120be93dd837a61c8710d7e5e4b837da3da8dbba33c9924ea7c31d429154990ce6f0baec7a6e2eecb6a43aa2e139ad3a93b2d23d2ca6e8561e7b1a6c6a0f93ea7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d024055d2f3b7075504943f446a478d5
SHA11451f823b6b685811dfba000107ecc05a753b1b1
SHA256ec0c30aee8931c904e1f26bbec318507306e3b53d9e26b76fdf45a80cec9776a
SHA5127969c1a5dc5adbaeba56af4d2e0f4d1fa79bb9658123247724ef78f98dc049fb949918dfa0955cde9555c29dbcf7e1da2b365ebb00a9e558b332109f3bfe6f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53587c04daf80ad55e9e2b72601bc93d9
SHA1edc9553de5f3f9c723262f3ded170a4c7d92ee22
SHA25639afafdc8610456c9e55b4ddccb788ae82f7ca8c64a475b1867062976867bcab
SHA512155208849c4e882380a1cc1f4507368d4c1b7920f793f374d5a10d9391538961dd677280b297ecdb02241d20fa2714b0125111919ad54c497855cdd7b053a125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9620ceb9782d5a6b18ab48e1afe8d91
SHA102aec0eb368f407661760b0f8f9bbb13f95477ed
SHA2567f479dc339841bc92f36d7d0cf3df1f900e1e1674426641cd93072105e5c2e20
SHA512bd4afed5742253c0c184f93d99a52804436f73813919e211cc391bfea259b4a61bad2143f0f6c41ed499726d592f684605a18524b3fae50f28151d38319f168b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560bf606281a079fc140b8cb3fffb4886
SHA1e7bcc17e8205feaf5dacf342a8c43a0674bfdd94
SHA256ef8ed80d5535574a21a8a49b076a9c24960ce8d1901b11ebc0cf6b72c95bbacb
SHA512a21db1f890b323620eb954fcaf69b367e8f510b3d0fc8024efc53cb34fc090c4c3c1b61cd5e7e48e9fde5868800ae239a33aa3e9598b2441939ac287398ef168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b0c7776368db0470190bd68d41960d
SHA184de97a29b452317916d0f9f56532b20f9ce13f4
SHA256a35a42bf97d7b89dc5f59f80a8327d20a0ab9ccb2465a1057f1d6d7d54731ae5
SHA512689e40fcda3fbd7d350fb6ff0c4705e9be6369a98d43eab0754fde1acaa297864c14e9a59b10c289ff2d36d2dbe8f76cfcd8336711d7b9b56dcdd55c6245e092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29f4464c1d9ef00e30d8d15abf0baa2
SHA1b4134a0960cccf0c56cbfb0ecd7865d9aeecb8b6
SHA2564ad26691beeb0dfaa0848c477eee024a0bd2e8a16cc157e2acece5a0d9b2636a
SHA51271bf9e25247e72c22658b7142ca655d10cddc42fc538aa71c138a9c739c8591d4834e83320768423d14854c21de429b76409277bedf5a40337aaa2f78ebdbfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b3d5ca55068e9039a28f6b726f0df1
SHA16d1e6c609f29fdaefdfd79722c8c0e4708ca044f
SHA25662f95542fea63027d0f58db504eac7a83b859f31143e08dec3339e1b1c02bc53
SHA512077d530b9089e4386c77aee4fc850245842cf0b22b33a10f53895ef53f3a14781b6bf2ad7b60c9dc096fcb53073cad1e8c107681b33597f528f041d2cc1ef9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d58d7c6c2417e0f197e0d9644d0c51
SHA1753f69bc3b2912d696ab17ba6e90b73a4296ea4a
SHA256a03f180a11ca35310556bacd0b67965139b72645ca45ec0f24f62336aa671dba
SHA512934149542c7b4d4411a60cb5854942c34c88ace7da1d2f8b2010bacf01de113a707b8eee1293f89a10db1ce9b036c5c1e770c41f640308f640746c9c9454196a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50802bd69ed74bccafd53db1112d52be8
SHA11f6b1e7a08367cd3e94ddb530787ef5707fdedd7
SHA256310a5f0868c099ca80d9b9b018f9cb32ba039f8013d49ba7add3eff19b24c5ff
SHA512cdeebef8523591ef82b0b0e1ab31daa73c1c1700cac5c60be6b9011deaffc0b0a127839de505bc0923ef83783e13ac05fbab2c71f0b3f04f9065421fa53c45c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d006b4f201fc2191381c47cfcf4adf
SHA15bb068e85d1534ce1b331395caf9d5d9a6f5d108
SHA256188d9be43462e634e48be797d03a9bd35a5ad92ed4034f738502c989273a3d65
SHA5121868fbf471a06e85b7ec872238970d15ec0b902ddf42a97d8ff0519629d8aa72a2d8b5ca531ead9e98c92d830784028b3b8451b8da6a4e1ebe2a7d295f94b305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82800bb41db5e2a336e068c3dbb9a03
SHA177b02d96a48a0650910cbecdea7a5a86d3ccf722
SHA25684068252e4612abcc55b4c127c7eea93048088d3d574488d1063559cfe3cfd03
SHA51227c43caba4579d4847138f52c1b2b46b7d93252f2a5ccdc6cde349fc17999a76fbe5f305c483288ffa92b80db1bc811f24e66c84c4303c3812523c898969158f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c5cf9c201dcaa528c41f68a5ea6ea2
SHA14ec9abc01d97b85a90939287a80eb1192bc15e9b
SHA256e30b3adc06da02a3d2b0ee25bac529efafcf15f3ea0ad60d5d417a05ee31f6e5
SHA512c0763abaad6a20499b127effd43bb152837ce9f0ceaabfacb07baf1d524465e692f7c9efb25db2a5e18655fa9148d5a56b59a3f46a9b3435e387ed502ae7869b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e996bcc5b46cc478d0c7e37b1fd445
SHA1ba320dc4c3dc708712639b21e912b394fc931c07
SHA256ab26506c833ee6a286072ec909ddde58d996d7e04f6d76ef9b253db7ca263aa7
SHA512ebc297f10b2585af229981a341df2b84bdc953a17954b1ba8b523563c038978dcba13c5b8548443ac6f98ede2d20373dbaed9fb0529ede1c7095016064a4c34e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a07d2ff5a6ff34e4be4a8a76495131
SHA173376adb489121bff84cdbbcb822ca9abfa1b036
SHA2565bfc40da6ee328546f1f8aa23be9be1d67375d97004ca6987841a30fc0fd298d
SHA512c1f53d5aa2e123299a2c1259f0ec4d9539c8f215c98cb1d5c7a8d09bcf549a12b35debd5e7e0736de6a04aa8d284745b1642c541fd5e2d754bff0bedab2a7dc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507fb9393d303231035ca072a228185bc
SHA1e3fbe8e0d9d8bc7d16a66cec7cc67743da0cd1a5
SHA256ea6b2576c40bd8138a42bae50ca4762174eb28c6b3fe95a8ad00ad348dc3bbc7
SHA51208732be6ad04544f7c15fe6935532bb33c26e6554163926330d5ce9b0e75341aa087f421b36ea8e2b44056d805d54e67104569e97931fac3ec0285ba92ab97ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c8902911136541991ff04b75cb7e8fd
SHA1aefdbad4ef8ddb314eb947b89aecbef77353ae01
SHA2567e441e4b7c44c49db1fad2e50dc7d61b99fa2e1a94f4cb9d7b82eb3d36e3edea
SHA5124a93395b75508d74a34691f88d83dc4faa854bf28bf474cc2963cb093aac9a45b239de63b0b849ddf90b38aa0667adac97f23aeeaa10dc8f3c1680ef55c7ca61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea0bb6637dfd90db6053bbebc95b9523
SHA105b9068bb54addc27064243773adad77c52c4d4b
SHA2560f652b0106721a1570737cab8c216531987985ad4882e93015bec75da748b2af
SHA512ce529f9f805d456daddd7e7c5bdd2713842cc50bc161d2b5e29a7db315ffe39170f5b6450f15800c6d23d3dac5309fee75416a86f904066e263aba16d6e51a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c3931025f5dd4d955bbdae91c92f70
SHA131c183b47bc6b994c66eb21579d7e1c4dbfdb152
SHA256ac381e5d1bf2b77b7d97f1f3f29285b296bb8c96d977626923437abab188262b
SHA512d85f69f293dcc79dc92d911e0a8404154fccfec3c7de3ecc3c77df4a28d75f6a8e29de0ece6975d96b9a23efdb025c92159a821ddfd2bbbb03bfddbdf6a03e47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b