Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
281e430f9d65d883e4fc94da67676038_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
281e430f9d65d883e4fc94da67676038_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
281e430f9d65d883e4fc94da67676038_JaffaCakes118.html
-
Size
69KB
-
MD5
281e430f9d65d883e4fc94da67676038
-
SHA1
6bfe09163f8d1105b57fda2c730d26eac09f405e
-
SHA256
c15f805548e323dda938047e68302b10ccdeaae617a17362fe3e3a75da1cce13
-
SHA512
2981def6d689c56259b372f86a89f54bcce4097130aef134ebe0c7dbfc585cfa09703a9f3e5633ac811731c94c2c1f933f9f374959dbbec812110903acace052
-
SSDEEP
1536:C1eKVhnd+xmBgm6hIDZJTrBtnrnHVVW/Sb8RKzahF:CAKVhnd+xtm623TTnrnVCKzahF
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426421415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000023ff092b15a16a405f510948c0c6d684713d98fc9da79bb5270df8f8df0bc9d3000000000e80000000020000200000000587806253b013eeb7a7823b0db4c6e63be16dc3ff85b00e40f9a58ef7f194392000000090eaf2c37ae95f57807990d6125131be25e1fa301af90ac8e9ed93a6b3e3e18e40000000c328b33aa50c27dccefe7b4ef9f995a5892a34835d64b86e2ee2e09cb820151e331f5d5c0c32e4dc4550ad66925d3136c3ccd6c431ed490ef5c81a35fb94e9d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73EB1641-3B7D-11EF-BBC5-7ED57E6FAC85} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000fb4f3081c3eca6c0824532dd5ce32490f2c372dd83db2923592f21fed47e4b78000000000e8000000002000020000000d35f673578ad04be57b2c4def33e882c172e63235ddaff6735541e4964dcd46b90000000173202d47ac748c59eac3cecbb771675e2975406ec3d0124c8c46d78be2dff10370cf38be3beb3f2215b681bf300142358feab97327be04c4f428abadbdaa4cd6abddbe44d10ec151bca612f48e340df429329519098e69b0234f639006d0d3e1a0b6e971852107e6084549c6625930d71921688a224e75b7e8d62bf0a9a5401fdd04340f09d190e98e5687c378211d4400000000d348afc82fa89ecf0b7e30198ed05b589e6b36b3679f2c75fa600fc1def5934bfdd0998d2e9d956c583d61da480e70bdb1b0b54d9d31e674190624c7a7cb1a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0720c498acfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2764 2840 iexplore.exe 30 PID 2840 wrote to memory of 2764 2840 iexplore.exe 30 PID 2840 wrote to memory of 2764 2840 iexplore.exe 30 PID 2840 wrote to memory of 2764 2840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\281e430f9d65d883e4fc94da67676038_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_FFF72355A275D807A915CB4B42724776
Filesize398B
MD53535f12e9dca4a9ba21895bd719426e2
SHA177f2ffaded9afc649f65a5234810e2513c23018d
SHA256dfbb7f071edece0b9158f2546a8f6d7b8eaf41635b3100b524750e22bfd6772c
SHA5125f092a5d766bdcc6d6ed9965cd27bfe0e3906677529cc621ccebcb5d473e56cb119fdd0b3c3703684f25ab3b39b3da2d0a2ec4172f28e01a406ed8dc5502ccda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98a9d31cbd3becf7c5e5f4f798ff186
SHA17fe18163f7b3dea108240cb14878908ea6a9589c
SHA25687c2a0f49eb45912216c6cf375cd9d7293cbd27ac28fa6801403b7110ca56072
SHA512d5bfe98e46717e5df43fb4ccf52f7a07c04d6fc7a599b56409f3fcf99acb4537cb3fbd92c8de9014b7aec936554631fae2989905e7418e8ce43927e54c328cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a32ec60ea6c4256d1fd7bddddaaf29
SHA1b75fdce36d77ff575b92a692e9de3ea177441e11
SHA2566d81e48277d5c9d5e060218e074f7fa0f1521940522af7e6bf11d593024dec97
SHA5125b5f7abe26c8bf418360a072a65249a10d1fac2b1afe808b3e0ddd4e602d8df100d6f8e9e0fdcbcb260e0ea480454a7de9fa7b6e0f523d2413e5a7ececf55f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d7d40ed1bb100dec24c966ff8cdbe4
SHA186fd830570b57807df3fa75d160d8a2ea4f84389
SHA256881a4dc99af0906d2bf5bf09505e23202d25d32a8b2d49cd000ba0219c82f2bc
SHA5126f84a0327394f333862901fa145873eb8143b987fbe73ad161871e60dc26fc8b5cdc5127253c1ce5607435e6dba95c392c56d90a651b19d89dda6a22ec372372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fd0be6a54aee369d4c05b21e13d0b5
SHA1d64c240670dbd175c853192fe115da1a72aea181
SHA25628e0d7cb80ff51deb2048d87e73aa699a4cae49f20305dee3d9b05b072671df7
SHA5129a495630c7be80d7578a5917b2abbd3a5322c64c88201f881576f0de3c19056a8db61717cefcbbba15fd009d24ee1c3fd9f198d51b02c26fd1f73629c6c820d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a193693da9ab57f93b9fa671c633e8fa
SHA12be01241c364ed4551c963f189ccdf5ced74ad76
SHA25666fa0293f59e3d792cc629f524f5cbb84889533d5419f495bb3c6f567f2b1754
SHA512af1396a338c6afa8e145b9524529b43e02c2bce66eea9935136962e8cfa216a18dd69ee6e62f384ca3bd583afe4b6304ef21ccf3d369bc3848d5bf3dba4ed1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b4cd45129de742473e12922ce78e31
SHA15e8ba92f0dd9e02efd3600963ef2a9d3526d773a
SHA256293c0da1aec3bb6a61c11aaaba52bb67a3bced8261c381f5f444c31a0588dbf3
SHA512f13ef994227b4c8d598621476ba7d8ef8744e37962e5c5c200f4d7a9099f524a5c331b8604d249f5fa143ee5e3fbfbb1c1ab346e71cee4c052879940d1a98b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514373ca31a352f6b757e7bc0f801b5f2
SHA1b0c593f919873deb5e22f283f91ed97d860a0a49
SHA2564cd30011cdfd668d3da4036e0af88bd47ec34dd34998eba945cf2b168cfbf81c
SHA512ead2c91638c2c2b49b56f7af697bb07d200f66e414bc9642f032f34e662c44a4a506376e834b4fcb99337656beabaf27a90bf72b00c59312fda4ed5380550e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519255f492c106883455314b10f113252
SHA12ac525bae26134c26698040ccf5abb0c79ebefa9
SHA2568709c13029940c5e2f1926682402297c6e845af5d6c1072eeee98cb9f410001c
SHA512dcca2c83bd72e28b0ad60ee942b7079eee12202752072671d67cbe177f3f039d3ab3908e9302d686ccfbc52f9f7b441d9a4bed437df5c9b74bd53396a4e3a58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c79128de07d42b75a44a0f821d59a63
SHA11a42d8b3f1176cfe52d808ac7597ee0378412b1e
SHA25696f96af60b9fe012158af689092e626fee01136a2fd1c97aacb774ec0e605970
SHA51214e633d2a72a10515f003e2061fbb4977bab3bd0face32eed5dcb21f04f59cadac9dac2ee95f774a21c3351dc06566bc83d92f58aac0fe7d7d141808ee38c12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e5ca64d62cb02027709b64ee735d34
SHA14346c43a2906546e7e4c727c892d97f7a0d35a35
SHA2563d952fc2b00e4c0f59bb8e0cfab821c77c55ed46ad731cae2b61534b761f5388
SHA512f7050a93f28bd2c3dba8291e8bc90c7ae2c42f48ebada615118e705cecf91d7dd87a276e3cc0d2d80100422082fd2d5983a2a3ac2d2e901860d1adb46830232b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104627770aacdeb33d6977c95c549922
SHA177070e962ee7a61f4e469d01eca76c0057763010
SHA2565559def5fbc4d25a760f0130a4114a6eb159ef2212910e673270dd7590dfd1ed
SHA512bbfa2a51bf9b9fd47dd9e9e5dab418b8ad590d58ca19aef4a656557725bceb96a91ea9382a064d461952d01af7619afcbd6ab2ba5f0b72022cfba2124ac4d46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0a2a9af9c6960f8bb27773ca0b5274
SHA189e910db8eb10af65d37e07e270bcaa3cbe49905
SHA2568e5a88a283cfa6d792bb9e836f8413817061c73caf5dc94616a5f8f616b4b4ba
SHA5120925b8cb55bd8c69aa105df81d020a0d40df300e30dc6ca51e5ca0f83416db8827043fe84844481c63e796261d5416e46fd04357a50d5ad02da6c2dbd037854a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caffb612bdb8565a55709369b75b6d52
SHA1db5b825ba00f9ad0306e97b84f6c64cd6b94d76d
SHA256fa4d61de6f13bd9d4569ee547c5931947b9807cda69369f25c2909315baf1b93
SHA5127754ed058ca4c0d50d30b2e10ed5c3f7338d148008cd90b538ea31d7725da71514ef7c39bb012e2d3e128e68133bf915dcfd9b388192be6cc820a1ca3a12fd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8cb3dd22f7a0b89e5802f4ceee1b0c
SHA140f3e43da52914765c4ef9cda2d0a734355ee407
SHA25628cd31ee93305e2a63bffb1fec00dd11f72a7b7448d604564783fd029c436dc6
SHA51215eae4ae67c8a0d18a42b15718d4b229d767ece612d26cb95449692c89d6df29f393b6a230c349957c8109160ffc5bf9d7d1778199942e93dbddcad2dfb29d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591093105250b063c6d72d8af105f6ad9
SHA1b6bc91a4bed52cd6f4c93055cc645200c882671f
SHA2564b09af986744cce83fbc271a7226bb612f4de31b797e07a23c68bead5e0e7ffb
SHA512430f4e3344668ac8ef9f7e336c1bbad09bc9e253fc4cf77d6d3eb146172131700feaa12abcb962f171ebb7df35f9e7423b2e353c969ebb12935c9b204517947f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fec8cefeb7b2b448f3c01dd89789167
SHA1f53bcde1cb42765fc990a6f1e68dcfea0345873f
SHA256a36104d6fef314cc5b27a96a62d9cd18e45c33231c31f65b8a7a3e06453e47ad
SHA512a734b7c9112b3a09359f09c2cb1c24251674314c7bfe99b37c487767bdf2952c2ec00f080c84041e5f0d5b5a29e044d3f4828c9a3e19c495b9a16dcedf5db552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512b64ce9c5d033474ebd5ac9b4bff1b5
SHA1a67ef5d942478e36686827fc69807975bf07e3ba
SHA256e44266d429e27b8c6c13f3db7649e07bbed6d32cad2cf353eec8e13982db035f
SHA51284ad12f248fd4b105a227c4609c580c958fff5f9f947c11ee090655908ee6f8e761523cf5cacb968838a119eb177f7c5e451eb4d3cfb00111e9edfd13632e613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521f4b0e43647b0d496b3dfacd5ecb3b1
SHA1b8b7271f46a87e07967e4197bfc988325d03c5cf
SHA25607e4655cc8abcf23966953a1ef38d8322c5ccaf4480278303b5cf0fd5dd5cec4
SHA5127c00f744bb8970e97d1ae4e4a12f68a02a08e5ba9887d916424f623e26657cc52ee5a60689b7b44b9fb35db28dfdf2142746ac84b4b1626548c68e08e147373a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f8f8177090293f371052fd1596f4b7
SHA1906970abb934feda2397a8242bd4aaa4b6330602
SHA256aee19d675d805b4c3480f7af688ac659be8a9538cd62f2b38026f8b510db7641
SHA5120966b90dda8db0aac086a32f879efcc647d56ab5f3dd7588fc70e3b9ed5f5678d4189271b3ad1e4196dc15b182ec4840f5f34bcb4bf1628bfa0ab9ed0120c357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8b859b4e26dfcd1a5751ccdeb5b248
SHA1e61c72d8709e6e6b9b459b1a69c418bdc326059c
SHA2569f7bc8cf9ae0acb74aefa7377ee375d7b30163b507c1c4ac491fc0c10d010b9f
SHA5128d95796af38b0328febb394c41db461938b1311f2930597019340fe2ac7c231c033803a01078ff6ccf1e425a0cb8e247b97f8f138b3d1e3e8cef8409ed9e55ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b