Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
a9673f83c2a65f711a30fcb55bee6f41_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a9673f83c2a65f711a30fcb55bee6f41_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a9673f83c2a65f711a30fcb55bee6f41_JaffaCakes118.html
-
Size
6KB
-
MD5
a9673f83c2a65f711a30fcb55bee6f41
-
SHA1
aa35c13e313edae66c11accd3a6ec43e677fbbc2
-
SHA256
3ff7d195ace99fe6f0f532f96cca8ef48f70b389cfe1fda08abeabd6e77398c7
-
SHA512
3d765c73a04db54cc7aedaadcba714068c9be5ff82ddf15d02804a847a8130fce0bc0d8b0a72e8e8791978b1ccd966107d575a1cc4650289ca625c45cb9ca6bb
-
SSDEEP
96:uzVs+ux7xaLLY1k9o84d12ef7CSTUBbca1sLiVcYR16cEZ7ru7f:csz7xaAYS/G3R4b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000005c4a48315722f9f75dc1db3e2106ef48e8aab1f8e070caf41f1b97da47f13a04000000000e80000000020000200000001235514eda82a78fdc59db9791f3cd1ec29732f98acbdd51d93934343b3bcf3e200000007be00a3587eb00701707dde7628d11e1d01c8c07c6efb62c07691f9e4e6a585a40000000a105b5dc1d45f7104101a50f9e9f40a828cb4a071c4642c944b6b4743387e6705956cafb97c3e519782b53d3a630c01757367bb4f799eba6e822bf6ccb0ec100 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000398b45bea1d3a98dcfe53d06b2a95cf1f6752a0fb0b164209805167a1aa91b1d000000000e800000000200002000000011d32858e5019019b6d43be9b46130ebabbe28479b835c013e0591b464786d3690000000e8cf08259c2246c1ccceb3fe5e289ecfbbeb4f23cca63f7e74126a2a2992c5d6c094e56b6388ed63d3a93170dae1d37747d29a6a0c41954c71080cdf82b273a6fde5d7f78414a48b0395b42524e7c4c89589daa481346b1bc2b6b147d53615755815a961748690b48a2643fbe8b9c71c4ca9ba02887ff74705801cd43adb717195ba6fa45ef4bd0665518a8748e3734240000000928f3f282f3ffc572888cbaa2f2d71b47288ebb17ebf1899514940f32276640b7742c84f65fd35aa129384702c33d9de09039b7ad67e185541a98cdf86a93134 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{31010491-5DDB-11EF-B5B5-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430200014" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03c8507e8f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2440 2948 iexplore.exe 30 PID 2948 wrote to memory of 2440 2948 iexplore.exe 30 PID 2948 wrote to memory of 2440 2948 iexplore.exe 30 PID 2948 wrote to memory of 2440 2948 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9673f83c2a65f711a30fcb55bee6f41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8fdfaa8703ece9fd4eb1da96e6dfe4
SHA194fa269b2167b7c7248c832f41e5da8186d411d5
SHA256d34a008aa5b94794e628514ce6866aff65828d65ffdbda01c1341abe0d60b337
SHA5121f19da86290df9bfd7503dd10d42337fed677d7847488bf8ee5e1fa5ada8074289975822f745ff21de0689a4e5dbe31c3603e014b0aaedda0880cd64d8ab5ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0f699beb49f852a26a8c066218793b
SHA16f7a1dbeacb5e9db0a479b5a5036026c1301bc93
SHA256c4bbb23d9d38bcc0f03dceac61e337eefd3395456bfcc7e935f89ef9e6a40fde
SHA512028f39a8e1f0efc7aed8d2e83f20233f463a864fb267943f5271878f64a75a4977495bf1a79a81910a2da6e80c68361c2e80bf5de4665fa9e9781269121b7628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded3b559580c9e428e1e0031093aed96
SHA11988692bed26d777eaee0f6f80f75021e2f09cae
SHA2565240b823627a18a847bef87be8156ec09cdd4d757fd746f8eb163f6c1cb5cfb4
SHA512dc02737764f6e84e18152978f83d9dffd6070709cb8a9b5fc12887138835f435da6c6489b3ef631eb6bfb2d2e741690814ca866336fe292e71aa3c97247bfd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca7ab03103c8a9d9b587084dde260b6
SHA1e2e627382fc547ed74d27a62d5d46868eca6a0f5
SHA2569a5a20869778be0f92e164afb0cd201ca4ad29f13bd4524ad34b713200f3db04
SHA51265daa417e7af48c060ba4efc9738c3f101dcf359d02df7c6391c5c608c7b162e1a805a189911dd1a8816793ccab433136eb28827bcfce689ecc6997b9ac96cc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b2fc8ca1504e696cd6b3439d818f1c
SHA172c2f368fadbd76006c4acc47fef3f4ae632c993
SHA2564812b9665a1a9afa140f6de48203eeccc7f4746a0e3d910eb2c60403de209f04
SHA51261640299100091d071187f63812b523d7a4128312709e838b934ba109d89f9ede9966d66f1325e7abe68872e3d54e2bdf50ff83d7bf89392d0f782b7d939b417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564037e12131d4300e5854fe8f0d770c3
SHA1a25695dfdf2f84fcbb469df2086d23f01279b4c5
SHA2561a686df9e6737144d8947ed123d827eebdad4dc42b7f97901c7fbbc4a4aed577
SHA512e7fe40b0fbd37f1b4763517960607f04dbe7b6aac410127ca289286faac0d3dadf1de54dc8b01f71957ee85cf6839214a45386bc94a3f03d24e264aa16ee3a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567d6e3edde41507fb42f738b0c9900b4
SHA1f7aa6f72df1dd058828f934a64692095f6383872
SHA2567ad1c99213ccce54ef38951cb20edfa76b440e12553050d0a4e5c3764c93c571
SHA512980e0ecf325fdca83a91291a4892a642f696340c402e1d61cb1274e45863fed3dae64d35bc41883a3cd5daf2e1f055674dda82ecb572d4fac8a649457517f63c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cfcd09258e2162036aef2751cdfc38e
SHA122476c50f3cdfda30a64e2dbfda1d3a78e34b719
SHA256f3d4d23d4e0e2b4d22189a68d7dad02c19bac0dd60a283d41f55f0b5591a213b
SHA5125f2ab97e941076b5f7be5a5a283d75b177892509b9a56c587bc20dec09fff7382f7c6448952b9fcaa2694fbeb0f602648a903ebd3b60561a4fd1e44b3da7a31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5592bbdaeab3c533804ebd831efffcf3a
SHA13f0e2bada94db7fd16f04198e8549b06c69bd208
SHA256657c15dda5c568932f8cd3c6c2a81be2dabc6946afd7f45c08bda41b334d4bb6
SHA51215c6a78bc93e3bc7b38cfaaeb6c5552871d0d1d693753ba1bf31c87ed7c320edc04413dbf0b3a3a03665ecced9ffb49e83a2df54e203f39d4a78938adc6e3f13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec396a75bd09af467ac10f2857af3dfd
SHA102970a3d194704a7608a8051a76581c8ec94cd40
SHA256b6699719072adad3cf0f5d3653851e5eed6ad427a4d7105d11f4f5ccbe2d779b
SHA51217ee084b24ae086892193ffebaf3d8ce076d6400efbd5dc2ed0eb593138b6f003784837910558ae63bdc33d0634766d0ecb46b4d4cca015e20b745413ec0bf79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93c51451275d3094d00e83f073aa5cc
SHA183772ee2e5af342ad5bcd904cd490f240c47e6e5
SHA25649a82626c94644c551d6ee09e6f1f3fc23eefcbcc30c63bed2bc4342b5c1b378
SHA512fe8058a69888ab8b0a322e5648b42c0187f2ef81c2ef662c7eee59357f4ccf2a44e2971a1f2ca6781a3d834c2f8d778fbc40a84b29c1979817f6cf77a9a6bcb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a313e9abeb52ffcce8a9d301067290
SHA109fba815973bf1eac5ba7e76c40d786057e4554b
SHA25603bdb269b89370e64c74438d09aa2a7ae3c6e628602ba7ff7b6654f4dbd82cb6
SHA5127695694cec70a2dbd0c740aa032a65c3ee45c4c28f615c6018a89dc5de197b68215a51bce407f57fa0a9b03a40589e42d1d5bfc52209dfb74d661d61fde9d03a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dee9596aa602f081ae231781540ab06
SHA149bbf36546c87275bf34bfd794de521965571808
SHA256f9607c20fe480d2a51283a73751aada03256122128b70ead509077482153ede9
SHA51203208af325fde8156c31f38031f4bfdb95cc81d006cc9247e5902027fe390c4a89eb4df32c40b6bd54387ca5aa916f451a2ec85a81b6c826fa44c6620caa9433
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310d7e2e7037036a53131290584f48d4
SHA156d102891c8aaa9c8b81ee8046506dea543e59e4
SHA256ae82feca0e474d4a448396963dea59ba7b1a5309fb9d72f900604267f447aea4
SHA512ae4cf59e8a6a74af646892ea09d50373ddb047339c2085086c42db2e42fac4a273ef5fdc402d5ccd61b53228b312d0b1476795bf29494adef5df457923977efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163d4adf8ed5e6ba77612d670fd3d41f
SHA1550f5be488a117a6ecf35e166f40d697014d8427
SHA256da9b9c964f7823e12ae8fdbc8b997df6bb53d4663b29e8f7f104b8a1c99785ef
SHA512d3b54f15bbb6bf2b21a2beafc67f3815bde2036140b105250ad09755bc8cf0958ca8062ea0b3df26655b56ed19480b90ab3b03b08c08a2d8457d94e7621c7b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa2758e7ba1b09373a0706ea8141d91
SHA1cf6e763be745020640d2e29c459aff4d57527ddf
SHA2565938544e8aa092704f9164cdec8bcf3f9df2b490cef206cde465403aeb1bf97b
SHA51254e87fd836654bc1ae0204ab53bf285b4696b0673bf18f0c4addd2d3605fc6933193d55445769be504bbe6042a10dd43988f5229f707af65bb2b64f54942c890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d4a4df594edb3abab49cb88396a091
SHA1b3e72d3060eb60298f35aa58cefb096bd032980e
SHA25686198314d0c712187d208fdcacb04e349c4825af47ed8c24dc37e0d2539d7b67
SHA51280e3ea61acb9f7a6a663e328b08862404bb57f3c066b2bcd268288d87ac1da9c18ed46ce05eda43ccde31273eecbd0ecf55bc802b2c9a879ed22857e46793280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfc31e17753b50c4388ca912c4088c4
SHA1ea94ceb48a1f0052080011eb506c2f45c78626d3
SHA256b9b53e81e04db2b1b5d5a28396dab4d03d8ac66db806ef896892498c90627ceb
SHA5128a8cd84a24fc392846edca277f5fb1350b31848f8b782f481606b6a0d3497d43bd7682f46560967254ee841d9038ce50211e0b891914b0d5c394adc6ed7fc60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928a9553260ab5d055a737e769de4122
SHA1f5651d267f3cacac15a27e71057363324a6d7575
SHA2566458a34903629ba6a31f6035fe11d8a5346ea7bbf4ead9f2424047df69e135fe
SHA512cb708e8b96bd4439237967d922afeafcf35e1b2c85cfa6e9cc4b185f0dafcbc4976a085517659ce8c1c85f0847a91da3bea258e3ab71b0e46c4a197db1cdd03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca865324b478a3cb5e9e3f4b8b0bf071
SHA1766dd5143da880af40b19392a6ed99c42f59c754
SHA2568599e2d0c30088be90006e779d6ffb6f816da220c95b9fd266c5154d17dd0630
SHA5123192c94547b1c097c989f922577e2d7992de6187571589eff895935776fffc499e5772888b99a5b07000f75066303cf42c06d5bdc29b6419549edc6253b1267b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b