Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
f7193d0adcdc27cf8d17988256c59c9e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7193d0adcdc27cf8d17988256c59c9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f7193d0adcdc27cf8d17988256c59c9e_JaffaCakes118.html
-
Size
349KB
-
MD5
f7193d0adcdc27cf8d17988256c59c9e
-
SHA1
86aee9d3b87219b425d7a1db3a87b6cc57f212e2
-
SHA256
0308b88cbc83090b40c8c4cc11e6b9031ecb57bfc9c0db4f07f097030002545b
-
SHA512
1404dded5ab9da3ee34221920ad931910cf79a0b974a3b8759a478a14c09c754829053809b4769424444785b71328a6fda13c596b26308dd92dd9e0b5d107de4
-
SSDEEP
6144:SLsMYod+X3oI+YgR3IsMYod+X3oI+YAsMYod+X3oI+YQ:g5d+X32m5d+X3Y5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09ff3a1a50fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433469928" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000e4bb474ad60a391354ed7d564c4f988b41dad5ee3e8e238ff71ee187d2259d96000000000e80000000020000200000000d8e42f60ef95d598375266ff22d7549d678c61cde18fa29470ac65ec0bd48db900000001c90fa7efd9fbb18130c5a115ec53baf357bdb44805152ef48f0a1977908b974482ad4e5885f06a9aafc17fc70c00fa9b78a6c12bfee01e3373d5f078c7f66dcce442d75d49ffbb7eaed157fd140a8819d6361c8ed853048eb34b3829cc3e5d36f3722c7ce9864c326da2bb75880bc34f508365fa1b0469303024bcc6280492f46ba87cb3deb17dec8304534baff33d240000000879481460f68df711558c6f0f7cdf28dd769b73f1e601f17c75a07be263ed8bcbe8da3a60a99110a5a46c5213020d4c6bc4d0ebb8e4dcd3f8e671d0d8e16ca2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D01CE71-7B98-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000035a48bf569c49602fcb3d881180e11a3718f7d540719272262be04dde492de69000000000e800000000200002000000077a3d4c34b8a364df97e5ea255c7f4fecb7192295f2844199b3a72698abb744f20000000c4c8bae9cc744f6eb208112c706bb1e0b89eeb89b489b3b1e4c5699ad05094e340000000c42f1f6b00f6eac55b8a71da89b709d68266cfda6b65d873d695d45120f68196ce73474926e4421d9941e919c0fbdbe1b42b93cbfa3ea24bb19ddddb9385cc2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2576 3044 iexplore.exe 31 PID 3044 wrote to memory of 2576 3044 iexplore.exe 31 PID 3044 wrote to memory of 2576 3044 iexplore.exe 31 PID 3044 wrote to memory of 2576 3044 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f7193d0adcdc27cf8d17988256c59c9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a354daa0fb48a2fc70507c4e1944ba
SHA14fef2037cf6481f5f5f388d45b0aefd900508593
SHA2567c40401247c1ec0d7c9014d3afde3fe5d7f349b352173eec1bc5f96c4e30acee
SHA51216894ff991f47c90c31d71682a311fea2f38f084370a25eede2613a57c03505a7c156ed4fa7bfa1154a951d0814bb9b9d628d75594572e42942d7d20797a90d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544d45b7fb40b6db3e8ea6bd0c13ebb7e
SHA177a37a6335b089ef68d8d49b0702031a7a6a9061
SHA25630e7bfbdd8cad1e7c604abe59aba687fb8f65828055dbce6fe7433a5d39e07de
SHA51290065e398cc0ce5d6ca17accb75fdc27d323fd93720edd61ac22610bff754e2f13f8209ed955ea1e5d2feed14aad490c1f0ef839278bb3824f61925a6b07474b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755efa7c23204e7a5c33069ba6908c61
SHA162438d55d00d402cab9c4d2468c902bd9942b813
SHA256d8700a45d0c08befd64e84f540b401542f7ab88dc1f0322d153d02ecc5efadf5
SHA512979f027db37d2b638082035b3405e10b9921613b2a5a674574f5fa6d06e78d813be4f1248077fe66dcc5bf881579ddc434764d70837c1d4aebfd8f431d4d2ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cbf0a1ebb88514691c6d3f52f55bc3a
SHA105be1118fbe07f694a11a9da12ad90f92331138d
SHA256539a9f8e30aa5a3e26b87ea4624264ce919435b02190c1c20694a141043aaf3b
SHA512b918b86d66e1756e79f4180cd820c639c44f8ea61a85c0528002805509b4d77f944d7f8c4b5250f6917dac3a28675e9af0cbe10bb93655767ac74bea2c8674dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596269e385af84ab6286e13c1fdb27d2c
SHA14cb6f2d8a5b57070fc5edecfa79a50e9dfb320c7
SHA256f49358bc4c0336aa33fa3e61626fc99fcba538236f8cf5d8cd5bece2d032c963
SHA51294323705f2ba88cf69c136d7ef5bbd3fcce650a5efa3a0325d34335f580df437750cf7c0ecc05c1ecfe315feb92e8c7b6beaf10c84f3cd98f176b92af85ee01f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b35657f857e5112f472cf6f1a66e55f
SHA1fd203d3d0657905c7b8593b533da624eed88815e
SHA2563af7b0e4423f90864229fdb88f7d719334ec59185211ae745941baf0c409656d
SHA5126a8c1573613a07d198bc1e11ebb5778e66c3d1d2ad4aa050d85f7dd2916e9a310bc7030b6ff61a50d647ee83ed84edd812fa38a8b82f608eae95f041fff5dbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e146cae2fcc0285c319725ddb679120
SHA1f801e70ba4f8d4996d68601c16d4b9179619af40
SHA256273b2dab7dbec0e497af2e8e05f46aa724fa15fd05ec40877676ec9edaf3fb62
SHA512c6d0c8229cbb5c2f0000bfac83efc8a05fac9fe7e4f26cde0b6c6f1d0ca7c623745f6f2c83cab7f07c7c7cf9801d3a8babfe5f5cbbad8325ee8fa3a81ce3b47c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f996f99351a709dfffe11422b8ba48a7
SHA13ea980a8464ba602ba63b57177c2fa1d729931d5
SHA25624c44bc8064df69586ea9cc651438eb33969a9778438de4f6170fcc28bb53cab
SHA51291853ecb2af0dc0ec4a14f73753bf2188e5e89916a6e34d018f3b6937e3300b305d4ca15d581b5e5c9fca6f8d945907eaa83fbbff3236067820c4fb2bc198cb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b71328369fe1cfd00f97fa9e548e90
SHA11d47f1d06ff462ac86b8580a5c77d48f063886aa
SHA256377601f7bcac78e8b04478938c884b2a97a40ddfc3f782fa425928e49a7f77db
SHA512d42149be21998dcc23b427ca9292300832075f8f928ca2303f519913c5e82c8fd2fd0cd3e9b228800d9c68b8f5f10624100270b2c7af2df09232a3671e189c81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbbd990adcc84bad3fae0a7b575b0b5
SHA1ec403141e8a1385cf7e9cb9eefd373925f0d6db8
SHA256f179212dae9bd8c149c57f4c3021f6e6e37ecf18fcaa584ebb05d93a56039cb0
SHA512d7a3bdff794ee5dcfb38ad466474b9e699accf6675db5e00ed2e06cbb83b0660273e7b0b77c993916fee53d2a389f7b094d8f32463215784af7038a8538998ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569da47eb61f16f21582743d79268c259
SHA1509051070f79cdf1d21735d3a7de35f36b08d9e8
SHA25633f15d7c8fea64e3a544422101767e04212394b5e88ec687fbb110e52f45fc8a
SHA512c8153804131f0f7099638ee1e3a7aa2f93eb7d84a2daf375529a1491b1560c506abf4357a593c5c9b205899a5cacd6902d3d0420c1e22c93355081d0fc9295a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbde6ad7fd72a48b2397827bc772baa0
SHA13a19e32a52a1c3d996f6d1a8200d33540025e07d
SHA2564b35d6f1b21731b9d341f6cdc2bbed600d073cc928631e8676bfa098ed59e93e
SHA51258f72f927eb8b594cba252364c8c9d03fb7eed9c1f109a364c6bc6d9873973f4f91086d8f61bc31b20138102b949c4ded117620f15004413a08c0f032d99c3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3531e8cdd42b33dd098e8dc226de01
SHA1a32eccca9f4cd6bfb145198f18016b983fe7e7f5
SHA25602640c99f280e7581c3a7136cef60834fa767ba1c089d3addec29974fb1cf5fd
SHA512d643b6b81736b82351b1dc3ff13744ead5c54d579abed8006abe264bca81a067d7e5ce45def0062661b8cca945c25bedf036d67e85ce28f2f87de88de53380b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59359fdb3178a78f449e45c2e89b30483
SHA1f22a268d07e24374d9ad4ebf15930822283236c4
SHA256ff230aa506ce363843ebb643a526627666f40447849537b530886784ca16045d
SHA51242632682d06a3cb2c157aae174943f710c9e9e30f4f1461fc5ff22192421c0c91be73390d692b21fe232dc3105dc54a7bc4618dec807b00fca5875ff27f3a2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d071b1c580e7bb6874f3707c92491fc6
SHA1b5188030d27abf9d7f6996813574c3a04c2cecf3
SHA2563ad95b5cec94140dbb8ed232698e4f1a864837fd9a538efa07cb6657c15a1b5d
SHA512b5cb3bcbc54a9ad04b03831e41aa7736a61f57a0660a1487b25a6cb859c9af0c7b42e114b6b448dfb72a6e604f9248293530f2b6448ab1d025b34f4109d26303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b7eec4dfd5f0379c171082628628ee9
SHA1fb86f7a4581979c4561a468a505abf3081ef3199
SHA256ac4b5e34ac96fab2a125005a5af9c5c72e2b72788108ec104b0a6b613c2231eb
SHA512334f2eff1d04efedf166ed8525df3707df7022cb703221cf86fb0c37bf1ffc2de7dd5c35db5a36e782231e0eba97d9cfbc0dd3a7cc75491a04c7eb8e3ae64d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0c0a9ce8ccc8552244052ec1c67e2ad
SHA175fc6c45205c8ec2e1bebca936a263c0186d8ccf
SHA256969c031966e0c0195ea2a253ad68205816d12e729e65a25425da524211a1734b
SHA512cd1ecab39771156f7b65feaf78a0e36e812295ae5b4b4feb5a94748a665dcc929ab57657314102434a70b4d1ff4b81277ec93bfd87b2ee14a4c22e8d88a1eb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d2eb1ae7b7b9072bd41541021afccd
SHA1404f1dada5a0d961f1c9b9a0c4d6e17fcc6e803e
SHA2560f02a044e71017769a17454992e6ad0bf927277b2141b40649172aab373f0aa8
SHA512a048eb1def51bce676372423bcdbbeba5c315846efd1863adac0ef1d801713bb706f72c19c1c0265b7949fe8a5573de5ea92286ef6b3ed8ff0ffa2b49d4237a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff3dea314982c482c5b17723d00feab
SHA10c26f83ec9c202588d26e95b4756efa7b2376183
SHA256737f536d4b2681ca5a82ec742283c672c75d01b52862d90c14251c062a41f818
SHA5121172524efdc64a076ada215c5d1defece8426ff9db0a44223273db33cd09f90f4466c8b06a0c44c995bcdd8ec77225e50131759dfc3fdb12898928c319e10622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcde2c8f37ac66763aaa1afaf154725c
SHA1de6ea8f7b00ec3c0c8901db9de4e7fc593f7c918
SHA256e43cad6b17ff7851140ad66753df6c4f1d1daf2caf3522ce3ab9f35fb24b5071
SHA5121bedfaaf3ac470feb0e41cb57945961d14781113250400203f9d727659516e307c2339fd0d11ef780a3295b3b7c2aa2b54e8dc11858bdd798a095369fb7e7e0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b