Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/01/2025, 02:24
Behavioral task
behavioral1
Sample
JaffaCakes118_481a81efb43e1ff3493986001cc8481b.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_481a81efb43e1ff3493986001cc8481b.html
-
Size
19KB
-
MD5
481a81efb43e1ff3493986001cc8481b
-
SHA1
edbe1c866d6c89f214ceb52fcc8b595639bed2df
-
SHA256
7a469ad6619e038ca67480952f4db07f3eb55858b388aadd60fbe992ba37ac1a
-
SHA512
fa9fc5a490550e04c44b71c65ccf8b989da6edd5d1806af2f3b5f210665fe8161b17b8fda2c6747bd4b60cdecd4294ef247d1f565ad1d035ce9edf158398d54c
-
SSDEEP
384:zBqtZRsVuEc+6bkuOENbnuCul0LgIssbQbDwiTkBFV1aG/a1B7rl99Ye/ZGr1h:ItZRsV2+6bkPENbnHJZYDN4n+Gy1Jl3s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a05800907839e438f4913213ade3cb4000000000200000000001066000000010000200000000d75a16f2497862b91ae7784180a08931f9f03a96e69f554e9d04e5e88983eb1000000000e80000000020000200000007fd3ab191febd1d954dc7b067706389538b00992d1e6b60e06442650887c6ca69000000080a95194ba7f61d94757beb609114d05d764f9b23f1b8f99651a90464b6d88bb7a76dfeff55320e2e1b13067c0c9f77909dfe55477c0c5443f3499d8aae25bf1f9b3262f821553700b820a1bf02400c863c2b9ca32aa91027c0e18b2961578e4b2dc78ebb5c0b629bc9909a4715672587916d77a603bbe54495da75141b5599e2c277b3b9e1025f8eb37fce05ea3f9854000000045002e8982a7a4c2caf0937a787551819cdb42517e4e163358dd9517366f224c4541781bd223ac15939fc917d0dd18e3785b090f23743fac6d37ee12f06f8c96 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004a05800907839e438f4913213ade3cb400000000020000000000106600000001000020000000e5e254e7a4f2ec9bc0492326c5c4ea2ccb38c3dfcadd13a105c4529202dbdee9000000000e8000000002000020000000cd6a8a0f6e55dc4ca438b422ba50d233984ac0967bd28c5d4b44daa6381d9e8020000000fbe390ee32d7f77133a90e822466c021b36a315a6fbc2f84cd3c65dd291972a040000000ce0718e9807ba9c3792060818bc3c2ae9e5149cfba416573c7e460ffce311cd0845317232f03a9f459645fea64092bcafdf43b62b1ec4859c114af2651490ea2 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808b6c44ab60db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442378522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7CDF6911-CC9E-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1112 iexplore.exe 1112 iexplore.exe 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE 680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1112 wrote to memory of 680 1112 iexplore.exe 30 PID 1112 wrote to memory of 680 1112 iexplore.exe 30 PID 1112 wrote to memory of 680 1112 iexplore.exe 30 PID 1112 wrote to memory of 680 1112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_481a81efb43e1ff3493986001cc8481b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d30c18656d859c65e33c97069d205644
SHA16e56460c569f4625c9458cf55ffb31b01f5891c6
SHA256ffb5d262e62b205872ebb5d51875ecfd545406add43912c412fdf43837ab1dad
SHA512df169452f3a2c50b4bb1319b78392bdde92afa5c2f09293a4bc2e2408d42d51cd3dd6cd8bfd90907f5298335453a85b8c5580e61f42bb4fa87d22b72f5c3d2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565e7a1c72fdbc16a89268335fd84caaf
SHA197e732b038313ebfdd148b3918ef40cfe4a39a2c
SHA2566acb359eba0dfd6be8d0d193c17561996140cce6ccc263f8a3bebc9686c27e43
SHA512f067c7dce4615f33a6164c4ba996158d53fe4cc3ff8ab7c5801c5fb76adf174e23f309a86451f3cc919be38a209e02cdd63a2021bbb61c7b6c4dc73ff9db97b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9458eb91e46d72d8c74122cec3fb5c3
SHA18dbf076d2657b59eab125a66e68ce647cc395aa6
SHA2566671d5df6ac5643e4f87ececf01cc497091188774553c45e9b3e9dbeca246f70
SHA51244931988a2d2c60f48b996884931d5b8686bb8f8768260ba49cb940df77e1f4ec990ab6d1f76e704de6eae4e73bbeee3fddfe7137f848b26c94832d887ca9038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f993f7475acda6b3630dadf065847c54
SHA105a58d1d5adbc88eede9960d48213f244c0fc0ab
SHA256810242520529ec6dea9a9fba4f9ae07c2ea6f72a74596e582111ca55ed359918
SHA5123cc72da3e24799c3bc2d20d675ceb917ded337dca0c3981e7e9b42db048fc7229d22b3659322ca42df909ee2c03db895bd00dddd229101ab8199ad167167d124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c52ebba3000b348664ed25cea84ff90
SHA1d8971c369107b3dafe14980476555cd12f419faf
SHA256eb4168e779cb031497e10c7d990e6bb16bb05eba42310061c8c62ac39d90a796
SHA5122756e62db1a86ba0d8041a7ce3bd769d6c2494881adb8709a330c33010bba925196d540481e488f85b2a54b7a3df7df6801b0ad9873d682e1c7e021ac72db1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b83a16f520ae1abd5ba6ec6884519f2
SHA1980ab906af364a27a765032be46384697b8a7a8e
SHA256ed0570abca325e1c88e62e4c0cc62542da2eca6f75b0b47d895bea6327de607b
SHA512fb0aa368e3b35cf93d8b7885a41cb3495c93dcd2f57391143dad5d751226fc6be76963e785c8ea18f316482ef6de1a249201c6917355d836068ea6392a704911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d931b95c9a764ee49b7a2b80c919d4
SHA1136b34fa978d9285f1f3703cf8e45cc7b9594a4d
SHA256ed0233dd5bb5085878193cf407a93f49865ba5008d7cd08c457c32000438dc48
SHA512a9e06fd3ef2cf2cb5fcc842c4e780eb89f8f5e8e7c7733c69097f9b68450219789dabad2dedd8ebcf2f6688dc19614301b90751693a71b5c6f6694ed71820fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bddd79c08f2dd588b13e04a3ef365e
SHA1299ca17f1af61385822ae4025d9d77a7ed21b8c8
SHA256daa695518bac748ee36a22af4ff1f7488206004c8a16bd25dade2c1cdfeb841a
SHA512ea566ef6163ea690c9958b24404742e31666efe0b214e746dffd285b3a82b8038931aa6daebe7a1eb9cdc82898ef2b4d4f5200d2d6b60f3913e0c7e051608d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc7902eb7e85001e713386b36cfb38c
SHA152b2f57a830811674dc217fedd6f10ee6f0a0e0e
SHA256820c8874e3f195442240f22be470f4afc484a41b8cfb3b00acca4334cc92a3e6
SHA5128f39aa95925974a4aa0442b16557cc30f24e6c3297dc24d20f3b0f3c59245e58a1700a703f23b16ea3e26285f2bb7671c94c7cf577b6eecd77a684fa9ecd07a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56769ed22366f3eac8591060e96d56316
SHA1553601686d3b816407afc8447696ca1499eac82c
SHA2566465e504850b2170fa5ff53a7c1683208fddeb3940b66a2865a4f50f960a0b6b
SHA512670e187a120a902a5abbb13535029bbfab3b279698b636218273f7d9055504f19474d8485fe85822dcbeb91471559e6f8b0631801677df778fe50df4d304e097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582f08d3e756b3d59a3359298c5580dbe
SHA1205b56cd12d2a7cca4c6cff72217e485ba428c3f
SHA256b32dbfe577dc5dd7ef0109cf0459d481560ee18d4aa51402a2a48d7cff5337be
SHA512b453ee85a4d701ed47b10f60846b8e30956f62904d7ac07f71f8fc6cce5e8e8dfc694e8335dc5abc88d011f5f7faa096e58c20968f72fbb6a50562fc16ad545a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09bfb7d354620ddbaa459a03b65cfa1
SHA14476208eb887e0ce65a4aa6e91cabd1f76b133da
SHA25688c63bf67983e4295b643efc302abf991bb991ed0a7c664fd92010dddb40241a
SHA512f83c91a22c9345a8f9c48611f09385ccc6a51e7e2a2434b83fc07fa3c89d3d3953fc545cc488cfd4acca0f4b95d0bcc4ac7d7c6a3ae05cff7b59f261f955ae6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52021a373f4146409007c5b690a9ecf90
SHA1c646f8d2d424abccae862cbce3320d64a1d6cc6f
SHA256f643b4c26ab4916ce7235342ec27317c387d5ee776a9713b5fe4035001c63a20
SHA512d60fab0cb9389622c84d4201f8d78d0e84a4980519508ac9e7b2ac56468250dbc449893597effab29c1997c43ff67da0d9121bcf13d4c28f04ec12748d170d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b037e57892513ea34dc3fe8dad6e18c
SHA1ce84f1578be490e8d11d5022384398e156ff6246
SHA25681fffbd492b27066e64c28831674d421e658cdf9411d1dc4952d88b95da53e79
SHA512c8a092221ddb289cc533ae49711bed6141dc5f27462104664fda7fa8304527a970d4c120f1e8ced61f5139a9d5f4390709b698840eeb62b96a82addd73fcde71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b405aca0b36301439121639894eab57b
SHA1e20ebe61542a5cc62251529c318dae6efa3c116e
SHA25648234d89397365fcc3bf8cbe598b7c3c4f4017caddb9f4a080bca85c1b927da1
SHA512fa4c0dfd70df6c1b0e215626301aed2c272b38626f77a24bdd133f2cd1fc2e1163efafb15577ba5281325977f733a8b9764f3f03e5b3915e8a740f29e6e342b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a311651bf8427bd4c944cdd622c960c
SHA18296f5bc08d8a5e6513d74c2731acac6eea56bf0
SHA256bd837d8260937e8562050410ce901473284e6793a4902ae1901dbc70a0e16fa1
SHA512661d476e3eedf1576ae30b3b1e8c95af89ea783ea4b7fe41873c18df70780599e37ddd0bf4359f2da08d1bc14146c85998a4a8d86920f3587f1143c6242251a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6a08289fe85f9d579a53e6a710f0307
SHA15185177e729c69af04b5267402caeb9da9c67e93
SHA256a91ebc6384c2a8a1ae6d1886710c746513a338d0f78ff3aa85faff9b22bdd900
SHA512cbcc768cfa6534c1c63bada2cea3a85419d2deb46532cec8d29704ca3c0de4adb19231608af8d38d1f35365a32cb1c026101b6ed9f89d01162bbc4b5c4208525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd28f65702529a947a568f4c6743174e
SHA1ff11a9ba02c194f650886606cc95a431b318b93a
SHA256471c4f666ca7715d8539f2a58fc3cd493941a2eb0c75497c72b40c09d01bd6a1
SHA512ae4da57402f522fcbd94528cf779c8ade45e7f5e18106ff9b68c47b85a32ac1a5f383464a3602cdea9f35ac51ffb612d72cef758c27ef12d58bb039f58c3a7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56cef92996c32ca2f83aa25dfcb6ce473
SHA19898e57476dd84c684d5070c0a6ed8209dbea6d6
SHA25618c5bd2ecf30d609ccbbcc5b31af8d352cd853156f7cdcfe1c1302fdc0b22518
SHA51293049b71082d76bcc0486b6af01a687dc2e62a3c078935f9704df7beb13d567df81304696144989c695753bb61c956feff5a339f76316270e84752778c727845
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b