Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
5b1350781f921012f058203e5f3db721_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b1350781f921012f058203e5f3db721_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b1350781f921012f058203e5f3db721_JaffaCakes118.html
-
Size
14KB
-
MD5
5b1350781f921012f058203e5f3db721
-
SHA1
314f04c1ef1090e1121044b30c263a14c94b083a
-
SHA256
2c58a7a8a83a8174bf8c4fec8a1f431a6b6553bfc0043cfe8aaee1c97e1a22d8
-
SHA512
c530677695dc24a3d60258d7c15852ff453d440ccd5c89fa26f852425655cc635ff7a8a750373c0d4d8b9cd95c742ec86c916c35a111737cf526ab34af546683
-
SSDEEP
384:lydaWFZ0TextBoUzq8dE/aXXe/b2oYs29w+S+n8D:QFKe7BoUzPoB29G+n8D
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405cfbc3b1d9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003ce603afc42d8095199fcaec30f63b1fcf7685442f971c97656efb3150fc1b99000000000e80000000020000200000008323d44e7b5882a50bae67f418c7a4138cb92fdc89fc4017fc48903570a5b82a9000000080e9fb1979fbae625189e36db206204e916c8c7049207b304fd5ecfdaec4d404f39799328f139fed35edd698e045d6b2184acd7973c8ed42c6ab1dac4fa575389a52e06d8f01079750f8af11eed1ace782eb6318615a9cc20b0d01a6f19500eb4e99cda741995f20eb78174b2426ecab2860a4f4352d580d81181b7333555a458f62d212fd269e09b9cf1565687e158f40000000ae51656215d85c3582ad48b8f9f7b9d5d1e80a3272f7b58cffa64fa9c1fdf1ef6ed7680726839ba92fe34dce4ef2474e81bade44151f7e52ab2f58ca4225c44c iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427537877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB1815C1-45A4-11EF-B190-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000003c815e63c844b719c3bf820d0a19c5d9a6a90f04a4e2aa3a21029ef769e3ea17000000000e8000000002000020000000d5a7e2871465c50191d3621e406d240b89422176a945c1b46d118fb09418f896200000004af74d4fc11996799d955a9f1b5647cb12b6f0dea49c46f5cad8488d2e5d5d4a400000008da1c7a2557de0073940dcceba613287a9af62544a1e7bb6caba4f8c34270bd21b33b24c99ae317b211e7282acb978d4dcea90c01601045bfb0e6785024e26a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1624 1172 iexplore.exe 31 PID 1172 wrote to memory of 1624 1172 iexplore.exe 31 PID 1172 wrote to memory of 1624 1172 iexplore.exe 31 PID 1172 wrote to memory of 1624 1172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5b1350781f921012f058203e5f3db721_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f079cd1c038d6754c00ecbf2545c002e
SHA1e85cb46acb2b1dd17f207260d932c87df2209ed6
SHA2567dfa32ab5fdd996e11e6da350bbb7b54a88d8121e9663637277817f5606abe4e
SHA5124f860f07b106aab220db7820627b2b0139dca9a23716fbd198a53a6e0825a13bdc1ea1fd10470acf47bc023c348d1b6567a1c74b1c2103f50acc64c4a444a331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e58ecaa4a3427da282cbfb963e92f60
SHA1f8718cefc329ec296fd78982dd4c3cc8e6283fbd
SHA256111a3006ad5e2a205d2a22122b746803d39373f8fc9a224d7f667a462e5df044
SHA512ef18e5d1e05776091c25400a596b3a5659559a4d614ce48e1f5543f761d149b54fabbb9bde0d4f1992573c97c0f2ee95748d9367b43a2057ed399b4d2ee8830a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5caf9572705c4c6b375c23a2dd845a
SHA1728fc21a6ed1ec27ca1a699f57c30e5d56060afa
SHA25669b6ff19045f6d4314ff25957b9c986582e1e7750180a8f9f407c1e59256c45e
SHA512f03f673bb78cfda4944903feb2dfbe0264088abd075ca04ad1e4418253b7565fd83a2d70ecb7c4bbb099b836b9ca0197158b6d0acde0fd319112d3c6be9f79be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f1fc7b3d0ca42be0d8afaa4987d60b
SHA123c07b63cfabbe6305c574977d01bb4fe226e654
SHA2560428b3fe16dbe5a8b6496754993304763f1af476d960dda34b24502a2f1c8600
SHA512125f55a1016a916a1fd7c97475fad0d483e3da90138151beceb57d25e218aacf849623d127f8c8ab159d4bed81b4c1a4d765a45ae60a22c28704f7c363014ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688e913bda8eb4df0c2e023170ab958b
SHA118e037923bcc0dbeee4756c7cb6563e0aef6a78f
SHA256650d3c9435088090473e6ba1ebbcdfb3cef6651817c199291a2fcbf078ddd616
SHA5121ab40d6182ba6d7bbcfb564a88d74dcd50ada5aaea23251477221d06f09f9b565a6b6bd51595b2c11c0601fef085a6283812e5595ff5b0279c0f8051ea6bfbee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183b15bb656688404d6be0eb47c48c97
SHA1725079ee0a82ada1bf4ea5a28118a02d96c3df6d
SHA2568259ffec1fadf9b8faafae00312d6bb178564bfb9f3f8c13d342cca690410588
SHA512eb0d81340786c8d0a3a5d08f7527c32fc1ab058d0eec8c7deb75cf45f9780bd83c606abfcb7710d63f531d64862a38daf68244933cf20af277207bf552cab649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901ce31773384171ee6d87c200bfd044
SHA1fcf4178ebc514975f838f556669f047beff07cb4
SHA256066fe8f76618591d6c3181d09bbe2d92a9df5436165806ac6cfb2ea503eb3ab1
SHA512cdcea239be11a97a496e51a3b2e6552be3a4cc9aa0bb41f593723153e446b995718e8f6f74174584d917244225433ef1cb8c25246ac9dfe5d051de63c97f11c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce650172395a48c41a7d0558df17de9
SHA13475194c0f946aaac93b4d785f92e02e97807c06
SHA256302f8af0e50551e1c87aa70b33fb4b8400f23b2e66338eb8770ef3b991e31336
SHA512ce5c9b346219d8862687ead45aacacb6b6c6f0b3459d3e3657a130e0fc173ba4834d21b4dadf70399c8f76223954a3489c06ca8cd71fc7a46fddc4b798753ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d3c40564b7aaea35c04b4af660d2d8e
SHA18081b04994bebb7a9c4b99195312d72d29b30b03
SHA2560b13c90d9037fefa7cc85ea532d80ace2272fd402502024182c1d58e07229ccf
SHA512057e96a992af60ce0d07f96d9a791d500b1b39f9e05d869e8af060b65646f89d0454b70d529b6ff0c19a7772d0c4b8f789a74818dab9a38a2319fe81997efe31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3ab471b240457860601fabe75f30273
SHA17bbf790b3d8dcda0fc0d37bc3ec6d4d456f8d536
SHA256ffbc1e756efb9d6ffd665712f96be00ebf2865a7b28935d64ec3d949e1d29385
SHA512ebcdf1e99090cf6c1553510c177a09ad604e3c24a321def8c83e00ffe33e3c99048c562a5a8c91a94c32d44e79bc0a71de06982ec558612548376f743de9ceb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d1d2798bdb12e0ee72f1cd51314897
SHA1ce66a2c78ea03e8788eb24cff9269f2036b55bf4
SHA256a8cec38496d78e45c1fb6d69a2c5afacb81da69cfa0926d6ff71b69a4ebd9822
SHA512fe477f1fce75a608ce455b845f58e971f2da086e14c4565804ebb76f714d5443d95ff407b112d1c8f42423ef52d82749a5a0e123d17d0cb70b211d899e3c85ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b628630c3ec1925999a7c3893e8903c0
SHA1e22c61c2954948bc467235106be27d48a6a63484
SHA2563d6d8e6ed8840549d9e726809b5f70a01d9d319154f7449cf9a40a5d74d61556
SHA512acbc30882fd1e7d6434ed7c62361990d2b8fbba9c39d05811672fc8e1b81de25dbf1cc74a9ba240e9030feb13be0aeb1896625acc89640c9770f54f8c98a3467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c03abd7649b11366d364f2b582c2be
SHA1312f56afea124560ce070558cc5a4dae9c1a70c3
SHA25653f4b76adb861c0e62484b8ce9c762e3ee7dbb1a9502e71b7468036e78c716ea
SHA512389de7ee2bbae7e085fbc426901b493dd804e2907d65e6c366fa493b3c33e94ec0e90af4e6c0859734cc0009220957be2d49c2d03280f14421ebbb3deb785139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bec0cec6b453abe2f9442317d285c42
SHA19b40934e4f4443e103ebbacb16eeac6f88c56efc
SHA2563a8160a8a57623dabceb5f33e90d2f106062fb6dece52f827b954041e944bf93
SHA51231d8b8ef2cd1818a4868bf1feb5826221630777b6757fc1f86a71924b430160f34dd6c3167600637d64c157a7fbb3fa3df452d2e74fa25b61ddd62bdbc240ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54babcf011cb3cb0ca5c8b9df9e7e853f
SHA121330dad19fa1920c24c02bc14bde25eed0f38e6
SHA2568fabe3f98775f91b430416aed341328f8d9d0aaa260689a8d392f48e5390e4d6
SHA512ef7ffe7ec1c7c74bfc4502805fa1710eee48f246b5a62124f9ecb317da77009a09dd8352b6d0af30ba58dce9b9bcdecc73edc0f7a4c91d33ab55e8f720eb0d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8fe51c391fd5d74122b71d8ddb21db2
SHA19171337b07e7bf64b5784cf45882f19623cda636
SHA256de1ce94ae4da855d9c878cc2280c3a67d0f3f69a895c4ef5fa7611efc3ea1fff
SHA512ad808865639c835463c509f31b6c5f6e74c091796007cb9891c5a33428faaa6d0fc4cf944bfd0a466e8f1b070df31e1a9119403a11cdc24080bd81992a07b719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c39310fa5969cbaf238ffc38a448b624
SHA14beb3b0d872962194c0a0de26a48bbae024857b0
SHA256d3cd6d762fb6042b42b4f209e02b0f01b4579782190bd906a904c6ddf422da82
SHA51294162283d3bc453fd5737bb14c49cce730fe4f252761ef461c5ad98271e64dbcfae9c575cb6869f46293ba6a10f699e1eff6411b4c25d751e2030a960f49582e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2efc74692d9721aafd929e0c1d8f8ae
SHA1c7257b1ab98dabda58e611b8122210db02335ae7
SHA256f99e99d2febda4216e8bf866ef6281d0f8bf11c824a64af6d3aa4209980390eb
SHA51282c29b8c6fb4442870063a48be14cd9b1052ecdaaa0642f0dd7d997e9774a18e0a4aeaa7b4e1db64928a3b6a2988b94c288f141d3a6445603c785a3f5860f24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ddab4d827cb07e060e559409087868a
SHA127db513059470170c29219f2b31310c107dadc68
SHA256624eafca5d18216286e94687257d26e9e66647e05dc1c60e50ce7a3455252c09
SHA5121e8b4a920a739293b76bfbb243ca32e0c81fbcd251da79b0f3f6d718f5251030ed1ffb1ba2f025d0ff35fb6f7f72ce3291bd43e167eb02b37c95759e8167c517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d207ba508b0d3309d207121d361215
SHA1adc72d8abc18a7eff79b266fe8620deb82fcb497
SHA256432cd9ebfed52d5d79daed00a2d4b47d05a3a409c5d141c7268958d531ecb38b
SHA51264a6e8450ff7365a26df5cd19e04b1d43d60e278d94a8c1492b593118569bd54a50d3e47f63bd1fc5c547c39c393c4cff559946fb101758a9420d9f6fe42b183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ee95423b8e9f7ab99b7bf88b462ec8
SHA1fc70cb62a657bd776a02e1eafd8358166e852200
SHA256f2cf6ed4877505f5b963ec7f6699c05a74d0be44aab6aff375566a53429630d4
SHA5123a82fb7e445cf5def63fa6974179bbc4d4430afd474cdbc27a13e943cc71055a97e8cfd22256a7ca9eed50a596ec26e8b1edc58baf86823592c9b26f13704ac4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b