Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 00:26
Behavioral task
behavioral1
Sample
4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe
-
Size
13KB
-
MD5
4c0ecf9093881a252af481dcf3fb4c4e
-
SHA1
3181840f76d29ae836659e91f11dbe9df56e236f
-
SHA256
534bb9cda1bf2a03bb8ae45f0be9b44c3450df8130e240c2a0bb555cbcaffde4
-
SHA512
db6609301259c2f561bf17693514584521cca935911be90a3cc4b79b8af738e4550825d92d095e3e0b405a567852010f57bd0a0362846c74c800a2a07ded98f1
-
SSDEEP
192:Lxy9dBH9j/sAac4aVSxjQen27LDtv3MGS7/r9ZCspE+TMwrRmK+vhOrYR:2zac4aVSxkr7HtNS76eM4mrR
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2064-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10ea3cef16d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000097fa8cbcb956f03bc1964a39f29f655c60aa0b22a5e87add045392ac2bd5d70d000000000e800000000200002000000070885452ac5515e814256e0ae035014ff4eac8b4ee37e2355761ea56a08b0e0f200000005100594184f57c230ce2f0898069023d82c4a987ef2d91fdfb56b20628672df340000000b1ef204a213a19a625b8be296e3aa245aa1e2d7a1688f5f120f6628d300e0097c98cf45fae18cd8f235f7ff646a73638f8beeb70326fa0ebbcec4a738b23bc13 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427251482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A7DF8E1-430A-11EF-987A-EE88FE214989} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000082422eec43dbe476341619bb0213606d2a9c02ac7ac665b6ce5c1cb0f9af58f5000000000e8000000002000020000000d74c214cc0090241a16d471a2d5a17fcbc5b3787df65c56dfbe92b8b69eaa69c900000005d5c054b35d19cb03a97d21f26ce80be20373077c1130acd8c4795f72b1c198543f8d9a122615e10231ea5011f523f413545926c01d1fef09a9386cc99e7094552d59aaa063a6e0301fdafbd80876e2a7f91ac96d9cc45efa151bd30bc7e77e6cc38a3f5c9fbb853cc54eff4c5eb744a32620e8f0d40329915553fd8526445e3922912ceb6f3200e7eadaaea803eea7540000000d5fec91c977c14e5ab1ec2c96490653ced60a8f112e689591637b46c87b9461c5d64afa8847c581161e4d0f6a0e07a1c035d1583b2efdf0156aa96560db688d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2064 4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe 2844 iexplore.exe 2844 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2844 2064 4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2844 2064 4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2844 2064 4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe 30 PID 2064 wrote to memory of 2844 2064 4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe 30 PID 2844 wrote to memory of 2556 2844 iexplore.exe 31 PID 2844 wrote to memory of 2556 2844 iexplore.exe 31 PID 2844 wrote to memory of 2556 2844 iexplore.exe 31 PID 2844 wrote to memory of 2556 2844 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c0ecf9093881a252af481dcf3fb4c4e_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.alpha00001.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91c16bc2e44fcb4dafbca6c4af98f43
SHA17ee6c29120f8b6322b146cc73a118f6f451232b5
SHA2566a12d4e91d5b8a874876087ad213ca1bee24f4415225000aa1a10e547f35b928
SHA51222a73253093a98be0db7ebe36fb6aff66cdbc2b1273e5ed4cdacc674e14049718c357508fee73bde4b10e2775e89b243c2b21c2ab28bef347fb62f3f21db13ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51571f6ada60e728545d7de6bf931a86b
SHA12540991d3209797869a5ecd818ccee77275c5c50
SHA2566d897f790f9c8b0f3ccc39472c0982175b98780d53f4610bdff7ff009d2aa107
SHA512102e653167ce5f7878d82708ea4b32f98523e5cc7174fbf3601fb2da26518b54f6161e0e6ebdc6e98b8cc4ee53eec8da6191567657db14eb93e7e475525f2759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee872e1457b1c2a111c76ab147de2ac0
SHA14f667b868f4be7cd7518b1ee15df338876e4d1c6
SHA256c80c0f2a8e5da59bed641b374c95cd898bc4d40fddff35bc38797425a6297909
SHA512eca01b3e5ba3920db831d0fcb01b4021993ef80784f3ab13142b27d4b16fa77fce6d4e16f2a9fde5b6e306bcd0ff96fa8b95e262f1c1b943fda40639934c6166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d72cb14909f192845d83dcfe5772015
SHA1738a3398f334c8c94d4b6afc82aa58e8d3addfd9
SHA25611345dea84f64a1d166cb51629dc477a9f8631f13dd2ff6114032371a446bf50
SHA51291bff06cc7254eafc9f62e5d76c1c4406152cb73e80db3f3c9f4013c28752939ba90e42033d0e5e1cc359e04105abcda1dd63f9072975219dde900ef0b55f163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c8ed8bad1fd9ed4034b52f23852eb4
SHA18a972fd0517dfad33e4fd7e0a497ec4ae668a456
SHA2560c274df1d84ca79c983c6db5ef6bb105ecae7a06b39d5a15d95ece07304e3548
SHA512b482bf288d8c626b69714448ab2de24e00c045d0d6d2487311a7e1be1552e7af1175787a8e0f660b6648754f9f5881c39dbb88fb55e098db97c6ece419403a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ee4420958d0239ea8c504f405244e4
SHA10f0a97ec008d0828e3105cfe7dbba6acceab7cd4
SHA25660ee92200f994dc77269705eb81a7cc7dc80b6fccf9a271cd0929227fa748851
SHA512df178a9cadd0d1b83a396673ac506c8438e73b2f3cc92a8f3c7e75a54eafbc05c4f8ea24ff236410963c535f9a130966129d9ee1f962a229426e8e3aa0c066e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5600e6b2ce7616e6baf7f581777e19f61
SHA141f9446b461fa6e82bf0f6ace25863df56933573
SHA2564a838e8124ad1ae345a32909583d60702f1352ee7516d9a7d979756ff2d0cb67
SHA5121838ac291abaa49cc8f88d59dd399e8e2d9a51e180ec93b04dd7e3fc26d7ed265206ab65321873f108c836a67257d6c772c19d3f8e1375a5c88277f0b4a8c46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fd3f152710156a4ada64d8b07a1104
SHA1fe7115c224f867f330cf390d405e5672ebf7ebd3
SHA256ca93bd12cc2f07c3b8dea37e20115fbace7307bed57f3ea74bbbd7be283a493b
SHA512389713519fd242aaa54fb2087703014a1aa88afec01f7ea4c18a54a608be98aee6e4de2e9c6c14f01cc7ff567eec9b16c8e05fa724d650c7d7d4df82409ecf1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28664a5bfb5e692012dbd98347ab895
SHA1cd99ca88e8e583d390dc51b294659538a620000c
SHA25627f34d41cfa3bc49e1f6e9abe86832954c33f54347a248d5b0253768d94b3fb5
SHA512f99ca485be69408681b38aafe2b409ff659644ba70212d35fb127c0298647e2f9d73922bb026b2f6a63af5514da0be29fe518889b3d50514d459986090c24ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578a16bfda64e88abec9626c76dd30776
SHA1caac50a37ab0646cb5c50f3443079df115ad4b7f
SHA2568da3df181e498caee16a959645abd47ded2b99159b6688b209361e4b73d44468
SHA512127facea9ac381d86e565944f14bae12a02ca617cfe7b6e2a98f6b4791679c9a8f917b87614c94e34a4480e746f2622d88fa2761e24031a885da93a275b66482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc5c0e594661f3bd0415a20e536d132b
SHA1c05681e84d438fedef768df3abb2d48fdb92b808
SHA256f6faa618ca44ee62a1182f629971c8116ef7c13ba777d55f7d3887c0e9cf4686
SHA512e4fed27ebbfb4b2af1e0c4dac1e64e0950e17b4ea9b5e02ec073afacb5f3237556f160a6325bbca68bccdcfb0232b26e969de169b420d8a817103379118caee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d47f14ab00db87b58e397976b4de31a
SHA1a2b956d73f9195bc9544d2733aa694c447f47207
SHA2560244bdb5389e1a69bceae5839b3d8942dba02d0d35f6f3e713ee2a705b005698
SHA512d9c7634b747408e14e369f8532b92f82984240b9cb8255efa1326085026c485aabee2d9cd757fdefd14d09088f41fabbd10fd607f11effa48a7486996c67707f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503acad1ee44410f1de2498bab40d36ab
SHA161111ac0862d71638f42840d7ed20bdab76781f1
SHA2561a0f8f5f859bbddad355cbf554020afc9bdccfa82d64bdbda63a2a074eae25d6
SHA512f8d0b7ae6d86207f7e279ec977f4c555ee4a5d6e781eff12818b1d39c1807d8bb130ff0f58c146642ee7ee3c55695b23ee1b7241e16a00b1528d5d5e0118ef49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2b1ce1ecdc37aaa278732aa3cc0369
SHA12b96be58fb55d69d5ed4093aec5cd57d458c41f6
SHA256651b33108f6c2fb560115282eeebb22affc1fa8f4b8bdd51d047ced31a24e5c9
SHA5122d2e97b622f55c4774f7b57341724018d67aca746afdb286612a44b639b4e9570f2275ab9686ef8d4182c11e3da75b4535aed5b667e43fc20a20cf3d67c3b99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd30fa1c8605315193b18eeb38f1ad0c
SHA133ec3edeb057ae95be8a2df721c6babcdb52a3aa
SHA256aec59b55a90dcaea77ce3a9799cebc37e6e334bf3d52a8e046f617974a60131b
SHA5127781ff107579f3ac99351a068df57772886e89ddfad0b397631dd5d345a9a9e055cdcaca52d6f2758486e5ea32a5c540a578eec0819a74b4af2089e6c6cf013c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aab34f733eef0fab4bc257c65fee0c
SHA1d98111877f61f13b0801913b07002f07127b9c15
SHA256624e3647089693e8c90f0cbc56c2d481c3071a321c3ce65fb12cbaeb5c7bc140
SHA512b60f3900f8199364fbfdf6a667c457d32acf6033cef042773c68d210efde3b574437d1ef6f9752422ec9351c3ef91ac54722e74a2319ab8388e6bf530fc64bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01e22c7fad17ce62a730b0bf73422b1
SHA15dc1f9cf04d4f878f084068e090c240f459837c4
SHA2563c98d41cd85075c6410360a51c5db6d56773fea92cbbcaf2e414dac97eb8ea1a
SHA5126d34c1075d48fd58b5bac5096edede7c1d1069bfaa9a10da19878814cda9c06f46169096424a0e30dc567cf2cb06aa9ad75437a80de576414afe4b7140810c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cb80a1e87cede3410f1db5dbbe2b2e
SHA1bb0c3b28af6affcc283ebaaacad875099a2d3df5
SHA256fba5df54d70bcc7bdebd80ca966706e3d2e003a3715071708ce9fff7f2e0107a
SHA51269dc1d6fb0cdf922c9fe22889ac1f35a18f84bbea01018fc91a3b430a7746e4c61ffff79256f0ddea914c04c3b4aecdfeb9079b57a47b4154fb6be31d937a116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e41088577555260a84ed765de26b05
SHA1cc222167505206c2bd0afc039abf173c495a5612
SHA256ac272a6de341e54548a9b20b999f327383e5b15f21eedaa31664c2a92d4c444a
SHA51209e620ec8108cd1b1f9c357741cf7bdec8745bca49c7f883c6ccb5d73b9d470f3946bd1ad187f15db45e6fd76a10a89f4ba737823558c3548351a5acc944beca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b