Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
a89d39f060e3e412cf76c4cdfba9a439_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a89d39f060e3e412cf76c4cdfba9a439_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a89d39f060e3e412cf76c4cdfba9a439_JaffaCakes118.dll
-
Size
341KB
-
MD5
a89d39f060e3e412cf76c4cdfba9a439
-
SHA1
5a95620f012a0f06f285be743e9087ae107db3b9
-
SHA256
063e4dd5e6766f16be243c2a4a71ceb0ed4d71eab6ffd35dfc8a89aa0103489b
-
SHA512
91c1d01a00cdb5839b7cb0929a3d06ea297885870b68da0ff5ea41b7f7b6bfeca29c0d1759953c1916b1cfb1bafefb4b6f8365f7e885eacf6835047939ed11b3
-
SSDEEP
6144:bANdYJzUYY/McEqJCKIqCQeeaQeegQeesQeeGLQeehQeek3mM0V4rZeDMos/:bAT6zUYCMcd2kmMbm4
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2844 1736 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000009f968e01c7feb27b6872b6bf7ee08e3e045a15e39d67b711c31b91a02ad157e000000000e8000000002000020000000b5f33452b9942f04909761b744b20da821334c202e092a247e5679da58b49e8d20000000dd2894c5401d53838295c3c53a8d050717fa6862add233ac78256766b2e3cfb740000000b8e459a3b41a1010e53083705699f0e4c34df1b525fda792a1624ea5f4b7d84c8ff8193488fd10f71e2d8d4144a29bf0db5aee88f2e5863be6f5eab065aa3803 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430184750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6774781-5DB7-11EF-8420-FA57F1690589} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000422acee54a7b6f637f9feb4ab65ee88b3516460f11933d0fe3fb4bab4c62f1ac000000000e80000000020000200000005dea90dde20b651c448b3f66cf0e607c025e9988aebac361553658e773c7072690000000ba50530940ce2992f12a53ac715f02582eb8990a9bbfea8a26b3a8ef371f71c542116ae26c3e2b4415860fb04232b117938f7b4a7aa3380ea96874ad20934c3414da6abfe95e3ade6ae043c6e2bc8d3454f88a83f696f878e542257749bfd22b6cace644db4ee01b51f910961c4896c28549f83aec35e741dfe85716851b11f0a7eb2397095c9894757fff21686fc33740000000a5ec99734fc928d18cf17f2f1393b4e8e624834a2b1f4a36a128836f59052e559ee265d62bce8e61b02ff22dbb96ba48fe3cc36b78cb84b1b9dd74971d6f46fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6016a77cc4f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 2064 wrote to memory of 1736 2064 rundll32.exe 30 PID 1736 wrote to memory of 836 1736 rundll32.exe 31 PID 1736 wrote to memory of 836 1736 rundll32.exe 31 PID 1736 wrote to memory of 836 1736 rundll32.exe 31 PID 1736 wrote to memory of 836 1736 rundll32.exe 31 PID 836 wrote to memory of 2716 836 cmd.exe 33 PID 836 wrote to memory of 2716 836 cmd.exe 33 PID 836 wrote to memory of 2716 836 cmd.exe 33 PID 836 wrote to memory of 2716 836 cmd.exe 33 PID 1736 wrote to memory of 2844 1736 rundll32.exe 34 PID 1736 wrote to memory of 2844 1736 rundll32.exe 34 PID 1736 wrote to memory of 2844 1736 rundll32.exe 34 PID 1736 wrote to memory of 2844 1736 rundll32.exe 34 PID 2716 wrote to memory of 2632 2716 iexplore.exe 35 PID 2716 wrote to memory of 2632 2716 iexplore.exe 35 PID 2716 wrote to memory of 2632 2716 iexplore.exe 35 PID 2716 wrote to memory of 2632 2716 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a89d39f060e3e412cf76c4cdfba9a439_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a89d39f060e3e412cf76c4cdfba9a439_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start http://vlanetcheater.com3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vlanetcheater.com/4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 6083⤵
- Program crash
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8c43f861fb4512ca6f442579cba62fc
SHA1cf693ce63ca6394544310b5dbccee569ccdba1a9
SHA256b2ce3121802fa354e1196b3afd6d61c8342cfa85f90e20db74cad2d65618ff4a
SHA512f01e0fd361770955c0df8ffb3fa939bc2da417fa0097adeaf22b32ea299b5ce90e9585dcfa7fbc5cf1822c209f3e06d19d707e27efc8d285180eacc969557291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59362e9235c95c4f510284d4918f0b906
SHA10a80c1c7858cc1a51fea0715a9d301a51e6e173e
SHA256bbe081176f3e98880f51dac03e7af076aef331b4f33f8c8d41c218bbf521c4c0
SHA51277b2b7c7c5a1bb0fd725dd680bf04409aabfdd2020782c81b3247f40e85c0241a70e7b0e53af6688c51bd12488773f9e899a8a75ffe1189581c45d012fdf5506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d74471a983d126bb146af663cc5c5246
SHA107e6c3b0c951f5db2833c1ead4b013b5e6309512
SHA256f53aa3b8b8205c27b207eee07883ecf64497b48f93b2d3990ddf293322fbf5fc
SHA5122428f204824275bbef5413a146a51a7e309ef1c108d8b9fd9b599de2c8fd74487f99dd4480868bf1b6680bdec078937d6c3ee601bfb3bf4f828b8aad8e5a69c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52229e55e512e94c00f13313dc48e995a
SHA1e15cfb0dadd05dd54dabc15a6299d24c3a494649
SHA2564bcc3c26d8ca97b932be43c5fadb6bbafebaed7294700ea63dbf96a973835e74
SHA512600028c9951d7e026ee3440d83a8b7d8658bd861c0f796a0fa37ef08cdf95c17f40aa3dc7b2ef61b1f552a0c6cb5a69f88abceea4db72f74813ffc77eb4b2013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f81a3480550626ab84b360aee421afe8
SHA113b67905a536cc7483130e3152b325886d81aea9
SHA25670b4309f934731214a3268208b660e3def389b81b3dc430a86f7cf63968831ab
SHA5125c06432fb43f0bbde09f18b1740df90f8e41be7e6b0dd8a65a5d55901f3694e5244302aa4064bceee788377627a6a597c590dcbfb5aed03524dc6c6ae73c81b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d83c977541f72b4441f5a2994c867d76
SHA1443e06f4a00ac47d2178373d3e8306eeb33b8147
SHA25613cb49550203d8e7f1acc502624bc8af657d12992ea15fcf4217468b61821ff6
SHA512e4aa7f1ba141e5dc303efba38e520d36bf59de60c929de6b89a0d06da2e7f53b77959dd8de06040406076fc20d2b8668524ea62dfa934eb03f7a92ef925349e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5785067bf9b809a18fd5507d7d22b0218
SHA1a7976a2c7442394161880b47a8b0abb667570791
SHA2567539d5a39247f2e51513eb3edfc7ccf89f3def7755d835e90c3d1accc753c342
SHA512858f5b5e4e692b69ed66720782941a3dff34d0a88ecdbcf3d54ff201a5031cd2b8d0db139ee3bd197cf3f5abd291e27e1377a889981fbf446699930cab6440f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a25143ab67e6c362722aca991354ef2
SHA1dfbca8090a7921e7cd1fb106804ba5977f1909a9
SHA256c9d19e75a7c850f7fb445557d8a6b46f7a1526cf9452087802b4962aa41599c4
SHA512883528dd6272a9b8ec67ff8c3519947228d1164177e54f5537e40e7be29cdffb89d989652d94405585b863235bf9115236393c4613d88271c6ec171b7c421858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50051d9167a941c2608c9acfd6cf3a868
SHA1476d813458376beba96180db8599cb6e3da0beec
SHA256745fd1f97900f6f2246ed0658cbf43434c5956f1cf332d809985f3d573a14815
SHA512cb06a9e3aa398ed4a9760b6cc83067edc3a9fbc0cea9c5111c720d69064b485cb866b67707b2f4748dab528ab097b9bba101d3cf47d58db2d862241c73681651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD534a89339ad810373b712b9e369cd4b4d
SHA14f00c5ddb8b62f21e35f234f0f60d70896b92cb4
SHA2569a017f93b56baf8699f686b2fae10b644bd6ecc6b78ae07d36b7ae803ca50881
SHA5127ca838ef78519a2483ea6ff3cf5f0d14837d859c906ed30a29481f1c478b0d22b7474f25d4e0d107d2e28bd9cc4df7b14fa1676023c6c60e8bc48312194972be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD501e448d50250911da07c044cc2885cc7
SHA11cf488ff30a10957ef4cfad5c11cb7efe966f82c
SHA2563103ece336bfb64d6a400d51ca225867f7031d86eefa71332f15f1b0ce7fc8da
SHA5124a21b949376257e0cf64de3799bcd00bf3c24cb18f3b3926f78f8ce4e857bf23f62edee20d1a365ecd97204c6e1257cb98fa36f372445e582256d4f5b1143297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ab187eb33cf48e55c98300b895d7945
SHA1c443696fff471c95cfa10a10667a1bbd07b3aea2
SHA2569116540e6ef6435b0695faea4f78c74d22d45c261b420a7cd7947fb0b3ed1d79
SHA5127a5e3a18d684235f8bb903789c4075d63f4d4be704258d37cfe188ef0b2f24615a3867cf98ab9bb51b841ff544c4a089801d724a1cb67964e8cc813f262b2255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c9a4d2ef03b129045906d1dd9f8e742
SHA155f9c802665876a4f38c8d7d95852234472cdbea
SHA256eb469fdacc9556fbbfc0ebca42f95f75859414dab9e4e1163eca5cf09e93a372
SHA512eb24b7312ec6dda2231e66d11e8d6d9413f899872ac63928f22f9576cbe8e5093d47030cf97171925371b1a5d1e455f84f1e76be3a969cfdf27cddbe9c2792cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe8cf5b5f7f438c7866524bcb10fbbf4
SHA13fa94f5f5e3dfeb1a72372315ad13e7bf41ba213
SHA256adc3cbb2d4e038ef2a2bb0c76de1c02bb19e0c01769c5fa665165dd29f2c1cc2
SHA512b953f5676e054c6c6413e422e642526a2341663fa7392ad90f7aef41b9b0bae6d82bfd9882abc473414c6d6d2825ef27e457bdc701b16f7731e61dcbf628c30e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528e5cfb9b006c0721e924c97edd0d61e
SHA1b720c39cd08a2d4c82e57d872e21f1c657d3fa2e
SHA2560dde728c4079c898e0ad3a1d57eb631e1754c212c0a76f8e15496c6542f30f04
SHA512065e6a16438e7c5d8cf8a575d97e0cff90a6674daa0f5f2660f51b4f58158b4d60971e2a360cd20947dfb847fdc0599bbcd218242a1dbe1fd2b4c933c63091f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a113b4400ab2108c711c81a54d8c977
SHA17cd54cfcce079118249be686dc456077a5d1f212
SHA25653d343be202094be8936ac49873980b96511d37e72880fcd3e36e733c71c562b
SHA5122d37ebace48272f176f5daff7c2e5bc70aa3f6786a47a511cccafad7b058aabd1074bdf449f0c9451b3e190d71cc1854d421eb05b5d2c27004d6fca8fea7c26e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d8ad876dee8d90b370c757e6cf870b0
SHA1473c939fc86213fc4b890136918cd84d4ea6d457
SHA2564cdd4900808704229e7d876666313279372d436d1b4114b132aaf603c1af456f
SHA512b25ba0b3268f0c19179e8e8945b2f72f5cee42b417dc4a69bba5598028f972d28eb433c4d74f5f34954396c800aa175087f985953e6d37921d3a8a5abd1c1617
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b