Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
7e74449485d3318b449a54c75a921805_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e74449485d3318b449a54c75a921805_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7e74449485d3318b449a54c75a921805_JaffaCakes118.html
-
Size
94KB
-
MD5
7e74449485d3318b449a54c75a921805
-
SHA1
9987b2cf8cef72483f573705e80d13e1c0c982b5
-
SHA256
efa0bbdbac59ccdf0ca72b2a92c49d5c70f1dc4b0668b5f90618beef18231158
-
SHA512
d74b3d68d55a64e7040cb1fc5f2984fbd3c535073056646bdf73e30b1c087fd409a615f51f8acd6eafdada6d724ac59211881af0bf69466cceae513e5358c880
-
SSDEEP
1536:WMLiNj/u+pf35ninnFq0DUf7LzAfF9FHhLZSGy6BdkrY8mgHC+qpEyW:WAiQwiBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000979ffeaf01e04f45ae6257f69dc865a100000000020000000000106600000001000020000000a42ae720debd9f3748b5c41d7b260f101181bf3cb8f4ff96233a028eecd771ca000000000e8000000002000020000000b0aab2b4dc3f91072b8b7656fb9b5eb29fb49af277583451d26a5f86ad22be46200000002ba69d17b5d59640f81b853113764e21b8cb093cfbd04ab72d08a8acd19dbe3140000000e1d7e311c08b1eb165c0b80afa0f8638562f924b4d8cc15d4f787bb05bebfbf6bb1ac038d1e84cc25e2483d3805ea97c80a1245c4dd19b90d9f465c2f83f9c0e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000979ffeaf01e04f45ae6257f69dc865a1000000000200000000001066000000010000200000006bd1b1408c1d04c963d39c5b5a1bb896bd76030c2da3184a0561e1ec7d8b012a000000000e8000000002000020000000530f02bc3898e90032473c7432d86a268bbae660783da6dcf974d339b6c7294690000000cfe0f65c58f92234a5187c2aff7a8b8728503072e6abf1045433e486fc0d9e9edead6197de95fc01688365f843f92c459b649bdd7da3cff3c41c1f3e909e2a9502111b49d0737460d48a2b3cdb6d001d67b8a0088975dc49f23124ce9f77fae7b186803bcb60b0e9a2c9dccfda6442a755da7c78751aa369945fb2a0f31eae5582580c38c2c565c169ebab787885d11140000000ff030327357e5aad660538cf3b0a79bcde5237c194938b0b842e5ad125f228752ea0d43001979f41d18d18318ce99f2b1d4a9238463721bd0f94a0870abc7ab8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C50FECC1-1D38-11EF-A304-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423093381" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0e2019c45b1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE 2672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2672 2148 iexplore.exe 28 PID 2148 wrote to memory of 2672 2148 iexplore.exe 28 PID 2148 wrote to memory of 2672 2148 iexplore.exe 28 PID 2148 wrote to memory of 2672 2148 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7e74449485d3318b449a54c75a921805_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5410de2cf157b8db1a94307f41c937614
SHA1ead967786de0a4505f33ca9b09cf18f0d489a192
SHA256123cf2e10224c2d6f071db0d0d5e0af0b2c9c1547f2d695bfdaea3985579a450
SHA51208abec93f3317b59803f7d5e16a432779f6560cae408743c34fde61f63bc06dbc6d5ac4ccae3caa749afa1ce66f19027d6b1bc7460a5ea063d17fc90067110a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54782e2675cc8c14ffbdf925aacc40b87
SHA11b07ffdc2d05b455576e0d1d3741b1f59a7a80dc
SHA256b522c082c0ded2c060a2d69106fb770a5cd4f534fa10944858ece7d987fe00a3
SHA512ecfb761491cc5be31490655614e1fae533f06c11efc2dab13e93dc4e579f2875121895d38caa83a5b116e911a4bb985611902e11eff1716e2efd3f213cf68c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0e27c8d16ff88d52462f69dd34dcfa
SHA15f3fca448036dc8b16209ec2a2c46258a34a6b48
SHA256eca1d844ed568f2771fc9232c1534471be5c18109c7940154c3a59f347d684c5
SHA5128f9c6e296440198c6c7b8ae9241d3578d7972779b78c78d14a54a831237214a90d3890f06f32348c1340a00bcbb1ad38e55e36beaf8302f13fd8f2bc2315798b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e425598eb65dfba8f578c612a680b3a
SHA1adffaa2b94d24c99f7425e20cf89a49f448699c4
SHA2564367a732655e421ca9c626266805f1cc296446e75abc4abcbc347045f95831d8
SHA512dc7c204ed87e46ed0df0227002c996ecfe405f5f826aad9c4cebe550933191601b611274a77e92d0f75021b0808e7cea851f3531da6afbb624a365a4ed392f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf3fcaf1a5422f1ccd0fb0be526af96
SHA111de61647f7e6f81c13c08d762c86fb7d81c1f0d
SHA256226970d574e14688c4e613b66da60d2e8c435e1d4ecd142c037327180158c59d
SHA5120057a5a4707ffbd53f8ad8937241487b23aa276f9d8eaf3a1f65b73afb69d7548a92162f66eb599e4e9d4044ad989976efb2085658f9ce2c9214d5670cdd3396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a439173909e05850abc1bdaebdaab68
SHA19f7f6cee1baacd3b64e6ba0a4893cea4b378cab0
SHA256daefed021d7181f6fc602fb1a964eed45669741d215a4ed0290d66dcb7d82a98
SHA51232391fb71ecacab552182fe5fa523d5b17dbd8f462422806ac0aec7d57b4e7d7ceb950302ad77b9beb5bf4a119c10f17d443985f1a2ad73c323b43fe94fcd873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53399c23d290a088cf361edc8e276adf7
SHA15e5d6afd610ea6960af9224a762860f9958b6d71
SHA2567298642711623271d47d1e7352d39e9f7ea47836d795065d5061cc1661b891a6
SHA5128f5baaef3beae7119e0ad0bc419d796d99027e57dad0e99556cbfdab0c354129900fc29da97e67a0f361f59587b2fe990ce1cf807a2422d76b7a92f4280c2219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0038ff1323bb6b35af51e707b6629b0
SHA1759cdf95261e6f356a20930051cdba9636000a47
SHA256dd0e57394feed04c240069c27f967ae6065e5ef788a8db90ac63410a99da4ad5
SHA512eb989532a4914f94b00f8b0b7b3ff84551ecd4937be7b1ca667ffe0cb3793278e2c0fb36c3b24f92bb0f8515c19d0f78e71717cebda4124f37926dbd51a9dfcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52146b401ef0f0b36206655727c0beb3c
SHA119d37d4e56a3cf56995dc00aed37ba2f6d203b7e
SHA256d094fd2ca3dfee4a535294c690ef89d0681590664e3a960906311d5c2a4c8889
SHA51264fb1d3d0e82a109523e68464070123f88bab5fde78514d9d6b85e30844219e9fe49d2089617474ea12910bc49b0cdf2d2ac9fe2278fe47633a3e29e460677cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c913324f1eb6eb771a0b1bca008f66c8
SHA149e18677f0ac7fe065001495971a697fcefafc74
SHA256a0fee130d6094f39f47a488e5cfda8f2821ae1fb54507c2c5b2998e376937861
SHA512f3852b87544b1128335f251c3d98df571245eb3f951950dad16f0326b7f46bf2b945cd85f3d7ce120b57ba68fee0a277a1e544b5a21e3bc4b367da125558e225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c14843f8beb16529f9b175649015f19
SHA1cf0f5b7f9c0ae2de2efe8536f9d23de2aad803fb
SHA256cc260ef1e36c368d2f33f9763b7f25a7d0c7cb2b3acafe53f556378df5e4e405
SHA5127da6a1669d58177c749d1d0e97c393ea4a0ac93a83f5e312fa72bfdb5bbd9e0b331c46bcf17f491713372560046eb1ebbba5bb4b8c6649aff2f794438c1478cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590104ae0fa8c6b6f60c2d5d6b6082cea
SHA15899056320ff5dfd558ef1364badb6f5ba0f01d0
SHA2567f2d0a1a19948d41489c90e32bd5e5d7139682f1580eef6a18d57e66ca1dc7a8
SHA5128e904f06b46e9127cc020676973110f172f5409f1289f1ba2c36a03707815ec9a48c958d40e6b5e934898be7fb1c9fad20123fbbe523710b9040a46ea0a9de27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d030d66e567a9c97b671ef81aac6e58f
SHA1f50b24337bbaa7536ee9e782565af31a29bc7525
SHA2569afa342f8e9ef340a417900768077123f6904c4ee0aefa5471fc1b1590852d6d
SHA512e58235e07d54e69e1eeeb40392a37558a0b7634c0dabd6abbc0542d78bf144fcd09e9e645e7eeeb2536e1d3b2d110728a1bfc8a6f8b1f298e8c8a4766833fe20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad72f0373f02f03be9bb6e187c75bc4
SHA130d355c933698efccb306d0adc94328be6e71c1e
SHA256807e0d901eef181cb1f8890f5f2d7c9e6977cd2cd9c18e3feaece69c1a21c395
SHA5123b053159b8be72b53a224fc3875eb486e6fba3a47667af2e629cfa0dcc15828d828c0d43f7b6fba6a433ae216f06a34add63c6a6e5d13b259f8732d981cf6723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56491bf4fcd51bb81caf0b0aad6fcfe5e
SHA1e4b35133c01b4b5d9ed2ab523c512e52cdd64ebf
SHA25667c75a91c4c7bef047783ce593b015d7504fc3a75724cdf87b7cf8cf18f9bc09
SHA512920d78437425892943d2e00fff7e6b86d9a868b939c2ceb2415e03b31bf2acab6917c091a9eb14735e8cb8456be11dc8219b8ca259d27fb6728b07fe8a5b11e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1948b5208d0b861184f9cee2a77204
SHA1efbb457303aad41e82cee5b8be8305af700be4e8
SHA256e9f1d524e022abd3c7188b6b17eeefbae2f5efcb85706323b7a6788e5b2ce690
SHA5129369be57f048ef31bbaaaacd19dd78e706a079765bfea4ccb41aacbde9508e718bf519c24d1845e354910c8dbc689b6755ea2848add56a2b31fd3153618f9ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fa0ed2b58c3e30beb1e2c077e07d5a
SHA1c70c01a4ebbbd0afcc93632fe02b06f83d36ca07
SHA2568f455fcbbbb577ef0774325d64f7019226f4d863b88978da92c481480d69e0a0
SHA512660ac1935e04301877b7513962ef7db38ddf17c6300e6618df97d6bcd734b3c23baf08d131cfc3eebaafde76bb056c2400b4281c1a94000c9c3be6152f132063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8f9995dcf2b95861d8ba0e9ac48e22
SHA1c30cee80cff2cbbe330d6b541e584a2c85c6cb81
SHA25648baaedfc165a3d469945fe0861f7b94607023f9790ca52b85fdff6fc5bf4f22
SHA51223d958f0da51636c1321de9852775dcbb99d13b3a152f6455e15cbb86cb03f76862e1fc413dff4c5baf97c3aecffe2189fa4172f2cf3a63e90253641331520c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a84be65c50573afc71ade73db049a0
SHA1405986a44c93bb7398ea20ec218e867f1430d786
SHA256486d0efcd2b181ad881423b10add99e004dc7e9d3dfbef3b8d3c75d1298744e3
SHA512ebce5b8dcfb6d77e0a69c810b91a79916fd596832eb222aabdfd00e686f2fc6652722c8072a30f062cee51327fef3fda9400deee58fc701a5369beaf22f07f69
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\font-awesome[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b