Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
3995f2304e59bef701eae37dcfb82f99_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3995f2304e59bef701eae37dcfb82f99_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3995f2304e59bef701eae37dcfb82f99_JaffaCakes118.html
-
Size
6KB
-
MD5
3995f2304e59bef701eae37dcfb82f99
-
SHA1
fa643a7707386ff819e60e9ba54a9b8172a0612e
-
SHA256
a1cc0ac286201a9f9e1abdd4a2db5225bb36775e4667206fdc2c8b623df5c664
-
SHA512
6de1568b2bb98c0d6f2444a171b486da19629c424bb70b3473c1f9f0f1ba043907f9d03835f75d89edb52c82ed0a45437bf589685843a8d4f6eab6d3cb33f83c
-
SSDEEP
96:uzVs+ux7gjLLY1k9o84d12ef7CSTUqLcEZ7ru7f:csz7gjAYS/rb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C7518B61-8886-11EF-B467-D2C9064578DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0a6d29d931cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434891659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008235d0c5c450494991a2dff61c9dab0700000000020000000000106600000001000020000000ad8c43ec8597e100bfcd398e39494793e5658a4691bdcd06edf815777687fd91000000000e800000000200002000000017d1c56db9e199231098f7070f3770579b44a8f6e94f3f0756419f6fc8f06b9a200000007f93122d6ebf950265a0bfd04ddd976524706e165254df86e40b4116c45ccf594000000064f9adc8f44e6fbc52ad3d1e618a10ae880f7e0b0b08367ebf1998b1d33d8c2292c42d44d95ffa4ff4a76487d2ebde179d478eec1245e7151523a06bdbbee0ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008235d0c5c450494991a2dff61c9dab070000000002000000000010660000000100002000000049643a00c8dd0e34da77f5f1a52f8e8ba53ed565f6a64536296a9b072030c10e000000000e8000000002000020000000392025316388c929e7bbca62fcce1e67be4454f5ae7bb2dd09e671fd80d1920f90000000fd1bac9394debc1f6cab728ec8bd91e1dc4d5bc37ba16c5d8d2aa2ad6da750bf6a02f33fd03c65c071c9fe088823962adf8af177176d1cb787d47fe40f8d5d8463d576c6cc06fbc92e6abddf9b89b063ae0b2f5bac90c9a24972913144f1440010d1272ed088055aef4f9f693c47bac34e8e94e2e2344de7ce4a3d9c3a631b257dc87accbacd2879258bfc6e487c97d4400000001855cdb76680c38aa9d731c7f66e0d0a0a0fa32db6292535280966b9636739643edf560f26e2c37abef2705ef9cc87879735a1ba05bacee53cba08af4441f0d4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1412 2368 iexplore.exe 30 PID 2368 wrote to memory of 1412 2368 iexplore.exe 30 PID 2368 wrote to memory of 1412 2368 iexplore.exe 30 PID 2368 wrote to memory of 1412 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3995f2304e59bef701eae37dcfb82f99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4bb015e5d5675e916257a30d89b91d
SHA156f16bd4040af4d37e6ed4846e5a548bf50f165d
SHA25612e66905e5481521b422f94ea675f9cbe5c028dca821002903a3af73806e391e
SHA5126efd103f96f5db1c30c09138909dca7b592c34efa71062aaca1c0363ec93ba5f134dcda3002776586df95dd787d3703d17f23023454b8f9e16a4f16c9b955c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c3c10707a7b8d871a5fe7f1575f65f
SHA187e5c023b49e0f8bde1507aa9bc15efa71120999
SHA25682341a3b79f8d2b2cb2d8eb47381fadc296b39574a23d06cf5c50be7000e5883
SHA512f79029921b1fa522af696f407f0c46bdf7c128571ee145f80861ef8b8eb139e6e09241704318b50087fbc29b114e6b99eb59f97b991133b34726963f319aed87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598355e084a264e3e3382103ba8877c5d
SHA15b3ff87d7631b790f249e06452faa5e8413a3bc0
SHA256a981bdd967e55c0bc5498486061ec10808496d5b0ee16987b6cefabfba8f2f25
SHA5120c059d6dddfd39edfc7a0f83906e33a3216860eba8d14cb493ca59be5b2cea5ea2e431828d1757f219fc55acdd38ad269a92989336a23193e0f38d9edfcd6ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b608bdca40e891280330feba11816ac
SHA17e888f126171bb893c8ceda3203b69c545b432c1
SHA2563dadb5ddd3b1844a1bf2bf80c5d3fb91ed22d8c73ce9f34a4aaa47452fc35ae0
SHA51265d9ed6781e5560173edc3de375774636604b1761d2c0ae638c33554b1307d76c1ef746a0759d94c78638800c1203f6831cae751d57ed56c21f30ec5aa7a715e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51107bfeea04e37250c7e88b9f993b6f5
SHA18521b3710db6589287581c812e6aba295141c92f
SHA256b4b93666fe76afd264e1f0133ba0feeeb47dd55a3d1b33f5737dd358be600c0a
SHA512cf919aad5218f1dbc22c740fc31682a59784dcb374e3c324b69f6b6f7555d5fdab2c078f8df4ec3233fa6aefd216ac9c388b7045fbc8b67287132c4d0d239b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8da43dc1071ed0bf10b13265823965
SHA1e46a8a0f3ae08765f7ff6478c87568325feb3dd7
SHA256e403b3ab8151d8f87dce8b8ba0b98132b3b8015f23c12663d7ddc48f84283b36
SHA51231a98b2b8dd984e8b29ed610bd845c52211197be0c4125f5bf91e2ee78c8ea7c4c0e62168e98e30817d3b0786aff76a73c177c6fd357f09bed5d5e5c618c8a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abfefe5569b449b6b55ce16e649e108c
SHA1f034308d8a7ee1025c71c2f93a6b997abe141135
SHA2568fa6aeec3c4ae5327479ed51aa6297752398f4f33e1725a6ff231c131abf2519
SHA512aa10de86bd144c70b0ea3c7eca6498ecc0a36e1cae7ddb7a0e04122f00e796d000253595518ebaa59f628a381861bc828424f45c9778937c9f1e69acb552886c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567fc3857389ed71dc89997ac31d32e1f
SHA1ebffa4eae2f5c9de94d485d60d4086d5743a8763
SHA2560000924977a935f463f868bc2b5f07d528942403c539168a4073997a0e693af9
SHA51236ffd7427fd9358f0df443b700647e9177aef09fab404237bcd1be814afc244415c3303c61d9df086cc79efa3e652281f4da09829e31f2e89c51a51ee8eb3a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56acf2798b1cdc00f84552c945c611f55
SHA1fa526dd6db1fd9f191f97bc21f6bb571ed84b48f
SHA25625b0eea6710fc41c2fda5755d37bc1fc893161cf684636fb652551caad5b6582
SHA51297b154a0b46bff61de7ed3aa0c69068102476b45d165f9c5ce3bdb1ea610522d534f80bdf26553a790c97405148b2574d5df08a2081a2a61f2c93b9c733afaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25a883c1d43af6514fa7979cac8a744
SHA1a29f34cf2bfc9a798817ac81bf4d93283ca7fb37
SHA256672aa78fb6cb16b82c37be71c3d228212a250725d90eba7ec4a3ff9cf76693f4
SHA5124eaa1f2f1517a0eecd52abd97baceb4ca8c748877191b8213a0ddac8e80b5acee0127eddbcbba1fdce60f53e9b8f6585d2640253a54347ad67aaeaa2c4700b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad242a0af9de28318a4ce742795126f0
SHA159c76e6707142f277c805ad284a7da9798c783c3
SHA25628e7179729670545ff0d6b40dcac65c286580c06ca6c2c1c9716a16b08d8d93f
SHA5125ce853ebb7ac35776ff97be3345b048dabf664b88e1546fc2bf6fc036ac6b3763069f4a9c1a2bf8afdd2231268969a49ca33216ec3c501257cfad23ef9048993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcf00bc206faefa6e37f198e15acdc8
SHA110aed017974ec9f4d3650131e9030e0181ede964
SHA2566cbd4188d7dc92c7836aef862634618a0388af1134f316b0c591a21ace95a765
SHA512f98d45dee981ee7b74c9bf66975a0db55c35a605813a9fd34b658ec5a6e29972d931c4f5be9a52995f31cc39730f72246b2957f44a1f7083185a14be916d2328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1cf2665e81dda2378dcd98d71a11dc
SHA1c6cc124fb1f5a3b08eb1606b53382c9b877bc394
SHA256965913781180d2c28a735b45491afc02d63f015e32dce32b6641466829302452
SHA51242e0c47c5281ebd45c5c30deaa6de2496891f5a28a2ec637c0b7db8b2acce6d605b42ba1d082a36c0a7bda25634b9bfb3cf9e47765e11f9710c773a75938b7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdd62fc79adf6d8c8e3fb84a3306845
SHA1cc6e39b56c7295d601e9b09caac6632690b57f7b
SHA25627da0d0ff495169a800bec65e33c1174ddc143b2b66c6b04f926696bd2922403
SHA51230df9916e3d8d2290345e609b2008afeb2a5589763befed4f62f39d1603a99ec079a9b27f50935eab95c6787ba145d557ee2424f131e5499f81559d2cc84bcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d71628f9ca48f326956b1f63177e546b
SHA1feb99b641755bab9818f78f384c8e3337f9fbe16
SHA2564df2e4069e0d1ae14d6e7f90bb2c67c4f38c50b5ac0722461451add8ea00f3a3
SHA51202a236dc1185cc2624564f0674e919bbe1fb463d230cfa0eb5373911db062f4ca2906ebc847376987bc5ac4499bf8e00561e4c2dc3f5ea57eb428774454e3d3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d59420b37546e42fbf533307864e4e
SHA1337e8462e67b3ace5ad863bc0f6c68760376fbb7
SHA2565d4d6569432c0870d2ea012b80bb9589656c9311e71261d8bc66d07ea257451d
SHA512b4d616b660c4c7717576af52d0cbe4720e9d6d9921b3494c3bc6e9c589c6bff2910d63e3f37ce31506a4877f157f478cb95d37a9b4e93e7938c06537908549c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1c7b0ce0bf9934493c3958fe26416f
SHA1fb5061cb1205887e74d7ca27f6a4e023b0e70b47
SHA256bcdf13ca5f8e7282e66383b02d010df38fc0c695d14d82bf0ab0a61a30c22dc4
SHA512561f334998af856890a6b3f9a9a8ec62fd0d3f03f231bc8d4a46d8a5e8c958a40a6f23a66cb1658eb944ea6fc96aabfe65571950ae4688ad7ee5da0b9acae878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656aba9e7c98337cc5d5ea1c3c6f6323
SHA19c355cfca38d5bd7d4428147b616ed1a38e39d08
SHA2563e9e9c4201d69cfcab7e403a50a20235339ad452bcd56471d2b0aea18ef1533c
SHA51230a197ec2e64017f082b580d1e74177fbca6ebfc545f30f5658583e35cb446f219080ae3450fca956fc9e8226364c992f52330f0ed6c0fa14dcf0ecf34f46368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1c2aa01a2e00881e49025a41f17531
SHA1503794fe1358b35e8f9313e9bba42a3fc145bcda
SHA25672a3b4782dd376876d7c1b306b7abe56a71002c818f82242a75b3cc51cc61ff8
SHA51281215d061b49d2bff1f6a1100ee2d976269d5c889918c5367726e5c538ae6c7ef5abf3f051e5cbeceb7c06f58c076c35d73ac5c2e31a33232888fd241a0ec9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564b9c463cacdb5a6e68a144c42266f6
SHA1163220793047b87cc0803c212626d5861634d23d
SHA256f3d978d8037d19e00f2373b6a925e93457cb5b6a8a951b69380a45403fa1de87
SHA51280889b06a13a9f7709dcca559e900b941950c29df8297d24ee2a1af3a9ccccaf1afee0f69cfa7a5beb6601f941b6c3c7ef24573aae5776edab5d935d280247ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b