Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
a5e1228ec3f657e63eafb9f731562e2e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5e1228ec3f657e63eafb9f731562e2e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5e1228ec3f657e63eafb9f731562e2e_JaffaCakes118.html
-
Size
53KB
-
MD5
a5e1228ec3f657e63eafb9f731562e2e
-
SHA1
2cad68a7a39d324436851236b462b0ea218dde75
-
SHA256
16e7f507583018737eea1179944546d559f291454ef30481dae5290e003f5125
-
SHA512
621d8ad5ff936882c263a23de4c4b3e559e9bbab8e3cee29d1e85869a53732eec6d815478f6cdbd17fe1cff1217110f727bac9cb1a62c1a45a95d32f67109c66
-
SSDEEP
1536:CkgUiIakTqGivi+PyUY5runlYp63Nj+q5Vy0R0w2AzTICbbqoC/t9M/dNwIUTDmB:CkgUiIakTqGivi+PyU+runlYp63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61D61231-5D32-11EF-BC23-6A4552514C55} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430127512" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000001a3bf24d0a12b9a9ef82c0a163e26089232f46be1797b1dc2ca2cd4c3f530142000000000e80000000020000200000001d49929be9929683ab5319b8f3d20986fa75c95fcfa85839593b4e939908b70b20000000710836787f6b47aca10d693edcad7e757ac534007c9af884c79468958a95fd8b400000002f75913d28c3f6c1f7e7fcf30e47092efbc21456cfa654cd39875b5b4f7af4331583a9aa6e13d87c4d01868b22cb9002e35905d0abac4cbdd849a579943356d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000fdf4cd7b843a6c0e33a8bdfca1d6d420d7f8aafdc1f0ec2995d332199d49adbe000000000e8000000002000020000000a4b5a1c640439f774400a53102c81740bbf5bb9ad3300a5cd2a068cc04a6423f900000001ae9fe3a074ff57849d780441ecee86e18d3d89502b1cf4207a50afa25b6b5886927a00c42d424a600f0ed45eea9ec56e918eca6cbc76ed3ebae701f2e89f46644950c71f00b2e3cf40722fc95e97e3a8d9f708679f845b2174510c366cd906182b8fc45cf6138764f489b9b23f62a38db645d58e48e41dc42dc9dcbc5ac1b8d134f5b4d15e4fbcf1d2aed35d75cf833400000004a39e7db5837ff08926cc0dce16436a0f3155ae7a9ab4b8604fdbda289442814ffd38268d15dc27b34835ec4b9a78395b5fecf3b793b7ad1d5b3c445096108f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03638393ff1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2184 2040 iexplore.exe 30 PID 2040 wrote to memory of 2184 2040 iexplore.exe 30 PID 2040 wrote to memory of 2184 2040 iexplore.exe 30 PID 2040 wrote to memory of 2184 2040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a5e1228ec3f657e63eafb9f731562e2e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d903ca94d9a87d1812e3030d572c97
SHA1f48468522042937cfdd569f56878950936f8644f
SHA256c4043abb3dbdff61d1769380453007039a1a8b7eb73ebf78e71c3c0beacb949e
SHA512ca75e69dedfa5d1a3160cd4b93e876792237097eee35f7344c2790318688d02970c0e127347a29e761bf8b542395c1d94fb5eae650caa4c47a5c38c44d7b54f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f615080bfe1ba1ab8d2c54c12f4663
SHA1bb13e85e787e9913a9f671d168388e3d482ae743
SHA256e564bcab466cabc1338e819bcb2a3325cee94e25bb78fbd4702db926e1dfd6d4
SHA5121ef0c3546a73c7f33c74e3b6da379af8376f93ae252e69795e353e9d36596bfd75d2a689ede517ab09c0daa3e25845e597dd465cfe865a04494ec34f3ace564e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afe5901b26aad0a554384ad554e82698
SHA1829e1eb6f50bc181ff75269aaed869c33539f6af
SHA25695785c443e339d64d5ef9e2f5462de9d01b0ee240fa2bf0089d2fe2852505e1a
SHA51225090e78285a5730cd66b72f5a59b05ab8db7d1e18cf3df1c13d9547490ffc53b254d1da1980e3435d85c48036ba829d7bec0ecb34dac4a5ea2c1ea01a779fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c3e539ceef360cf99ec209911ad8c45
SHA169ce64daaa3c0e00d44a76d98f12c3d2baf33b36
SHA2563b4ba963e8736be7e0e2875c2f7e8aaa1178c955e0ef9423df78f94e73195ec2
SHA51247059b7c97aa6180d0533fe0321dd6345435106a9df13bab46052f26ba2ffc5489ea51bf267e565ffa5344d54adec00dcadee96117aa02fad4da5a65cb3df8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68638f91dd5bacc51e83580d88f07c1
SHA19878f351b4a3ee0a459e5e3bb3dad10ef30ea23b
SHA256d577713e1e8f78c798d7d3d2b5513d7286fd73c5c7daea0e4f9da2fcdc4bb241
SHA512a2ad477652ce03cad3de7690ac188df3943174cd5e1d8ac39ec24e76aded2e57274d3886d7249b150f0ba52be9d6ed41e33845ed70c989da7380f762254800e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d9e4c92098f0c25685abd4d1479aca
SHA19ea51afa95c229cd3ba930b3d29577e1075d9a2f
SHA2565633596fba30f85225091e727a2bc6b084c0b95e2697bc0a5bf94d7b70e70286
SHA5120498f8aabb75e5f6c9f1bbd877d5046e4c94fe152775a90404924e061350a0cec8d43c6ab8314b8a374c6d320100073ae53771468310b6da34a8eb7d2d7ba555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583691a9699f7ef14eedbee53608d8017
SHA12da99b15800c63f927dbbafb2e4f75d49764097d
SHA256f0051ff303bcf1bf5b7b2d4b248ae40c4dc30399fdad95f5bf3640b25278f278
SHA5127d24b31c060107fb308ef9e0fc11a0ccd9c54ab8581aa79cd9ef89213a5d6d1d5c9821e99722e73a45f1f483d1733e6d24672bbbc9f58a0f01fcf88a17b4c493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c1bd64aa493bccc0c3874b332aebd7
SHA1bd37fd58c03d23c46e9ff0d9656fd2f7011a864f
SHA25691da5120c13ee4c72c48eb5f5f22771f3ef856e2af63c9221ad2f5b925869722
SHA512f140930fbb56da72f8199f2068093ea52d984984cc5e51b29ff4a990e0045006635d8d1a73e773390c80f7102999f3bd626b65d6fd54764d6991664ea37082cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9bffdfd1a622db084a99aa0cce09992
SHA1d1bf8f37b7ef04e55f88e4f5806e15877985b1b9
SHA256e6ba81028b44179da7d0e9d621096bf101575ef8642b0222a7181ee4711b007b
SHA5125076b7bfb40b3899766c0e7b5376bd4c4ee2956a41586727c9d355f4f02037ea6d72110adb1c021b3c113536d552cc9c09d44cfcad8e5252236911ce3a0ab54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7091de92993541cad6050786bcb690
SHA16894ebb2b055062b896f298d9fefeb774b68a53a
SHA256d008ee65d5be242bbe891743581a497e9ebaea2615f5b760663cd45126d8e7fe
SHA512d482da6044fa0cb6e6e7941484b2f68c549b054c30726f1d34c739289d749fcd927c5f5d6bdd4d0427b9f9e2d8b2e2be759cfa88aedb17a01de67f94adba1ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc81a51ca16c7ab70ad86055a2ec471
SHA12d0d9f5b22cef7388466c34eda504257191c0a1e
SHA256b4e00828b9471615c66b8974f5646a8d4703ec67993d03a00131792de97fb525
SHA51265b3260e640654e2b3b9d5294eeb91e5f00cd07dcf54b0af3c03c0580741529d008427dd2792aa2546f86b01059f9f4f395658e193f922b410d8547309ed0f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be6676f34618ced68ddc8223d0e1a39
SHA1df42782648f2c1705cf7180cd8539a894175c90f
SHA25682a485217843fec710b8a65ec360e07d3d24576c59ef72f74803ea60f7a2bb39
SHA51242857ed522688e6afc9e2ea4fbe0c190b84b4f84e80cfba9eb4f64869a66a3f84e62dab08dd1010987d3a218badd57529d44010136bea2f92abe486566178f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a0b997250d7662b31e34feef01917c
SHA1131512a03ffd517dd9213b7c80a03210488f9b04
SHA256c7bb55d33ac7f55339cd5311b68720a78d9e1bd1bbea4232e0fdfb1ee579396d
SHA512535d94ffbee8b6813f299b6413134af77f3b2875f852d3ca30bb22dd2e71bb884740e23b3a96e292b6a527ef87546c2f9c3fced8562289f413a6b6890684204d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e9eda33d247488c990236317b66743
SHA155d14065372316c0bc31e39289a1f2ae6e596657
SHA25638c9320f1edef82aa3c9e43b1bb1d54830bb1fb00909b0f2d4ae5ca05654a304
SHA5129f60c2cdcf87cf790461f20ae18fc27ea7ff6943510cb6a046a84f5ee80206f4267701447fe3a0238a985005d920bf39ce35e2341638e25b594854767dec154d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc3e72d5498c4e2d1802e36acf1cbaa
SHA13ec2938ce465fa027dfc80a831f73fe2c7b5c1aa
SHA2566fc20d83fa33fad9a16efd9d9cf6e82d74756a63bf6a15da402d3306083e54ff
SHA512156e44888c1da829cfba743bfae0ba4d86f9777b2da0f09a831fd8983cf08df806fff624e900f5a87ab43ad3399899966403f3421f9af64c59554a1e1fadf7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca37bc725e4ba7367cfb17d52ee7998
SHA1bd8c5c8c3b9f5af0817c72f56466dae66cb361d8
SHA2568ba186cf6de8e2e57aa72c5996e4e37bf8f0e57235fabe7d3caadb68c40db793
SHA512362b2afb10c4f9754285cd8776dd082af5447565cee55383f7b64898ce3116f6b0257c828209b2670368355cc9b5ec9190f46eeea69a5ef9ff1690c4be32b34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d29e498190012072a1532a11d19053
SHA198599efda6ee8e4c1912fea9092f57d950a1740f
SHA2560a589ffe2d6a746fd84541a91f5d094b38026a8c432d42fd261429051cc7ba7f
SHA512c6fd957fde3e378f41f2571d4c3223f5cf55593e434e1ddea34631eee23bbd3c70f6a93094bed809951571446c3fdefe49056819cef3242811f0d76ac49bc290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ead53ba1ea7d769b2fa34d726d8b27
SHA14548854069a1299e8d6da806da56623e6beaba33
SHA25610b3fb0d83664980017fa178a7e59e6946257169b9e6bf698f283261bad86a67
SHA5128abbdfde3df5d8d149567e50af0b4d0b453b51bf57179208ffe1eef608ea9a7081ac4d9dd49b7912658544c98562a254bd2abc331011171e08b2871ae8c17092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b836b248e66180e484b454d7a349a06
SHA1442d85259ba57fbdda03df20418c0d4104a1a982
SHA256277897cc37ee47343c6f4b0604e4a8c3abaf5403e9b576156ab5c555ad9627ea
SHA512151d3297b02470f56652368995b5022db24ee51b7f467d640a3691a224ced9cb7f1fe18390a8cd5a3af5d0f309886f2017df39787c1f69659055c05a8eb15e19
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b