Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
5ef26d04ab38f45ebf7dd104043b82ba_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ef26d04ab38f45ebf7dd104043b82ba_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ef26d04ab38f45ebf7dd104043b82ba_JaffaCakes118.html
-
Size
42KB
-
MD5
5ef26d04ab38f45ebf7dd104043b82ba
-
SHA1
507489dd8ad035e3983b01b5c78925073c4fbb13
-
SHA256
2d3a41ddd26b2116eb1047af7c00d6169f29781445bb8cdc9acc01f37339a4ed
-
SHA512
d6a63b83b727f94ad9d1f63395a58088372c53978bc2a94876125d6aeb8903e547e0a55f57b3e355a7ad4bf3111b6c54f08354f3c8d03f08b0f87bc1f044f7fc
-
SSDEEP
768:Zcd9QZBC7mOdMsEIYZK38uoQQqiPEfyFNQboM0impC5I9nC497+CHtg5kfZM6ZFi:gQZBCCOdC0IxC27uumwBwowlaGPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65D603B1-464C-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d6616059dada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005d84057ee357321055d72c783718725a9f64b61c9ec3659cd604ea85905e33bc000000000e80000000020000200000004fe6cc10c96083b4bb97be68c276223b7a139705d8e30499d793ce8741a55f1490000000b445deff71182fa1c0faf281aca0bd2f96647cabe9654a466037c27179ffa58766d57c204e806a25d65e8ff7bd073ba229374a2f308660ed80966b0c1286a6f45468af73dd840355e1da2956de2861fda3450fdbf0885a0661b77d781bf4e05219617897cebcdb1d8da849f8e7ce5477513ebe97d2c16db12a2e0804849b6393bcb2583421a3618ccb88a55b15f1eac040000000f3c5b52cf2bcfcfe3768eab5f1e5ff08faece7ce1de642fa76ebd3c87988296ef760f63c24a91d4519b25d1555dbcff7db9e8deed8b0bbe0d0e35a893035ae6f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427609810" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000068a330754610b22a75bf14de0198011902401b28f6f8b0e5ce86f69355deca4b000000000e80000000020000200000008fe23e0094c1a64a7e58c68a67676ec48d6c5cb5826a5bcd824214a2c6df06b920000000f4a9cede225e972770a29ae4d4842c2e41c41217d437149973b8fe20f1bbbf1640000000e8f81eb966e9673e3fede8caefcb14dc04d756061e8d07926b6b2d83a7dc0d37c3faf76effe6f97d18bc429ad0916bf495ffc2e67d92e7510cb031d4fd9cee3e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2956 2732 iexplore.exe 30 PID 2732 wrote to memory of 2956 2732 iexplore.exe 30 PID 2732 wrote to memory of 2956 2732 iexplore.exe 30 PID 2732 wrote to memory of 2956 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ef26d04ab38f45ebf7dd104043b82ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a85335e71c190e2d8b539db8a05966
SHA1124d9c3136ed05a9905aeef6fc0135b99f31c59b
SHA2564f686693b896329b3541d9e2cd1a961cea42ae16a60990d038d93a9aa9c93f13
SHA512965bc7fc5126c007f4377514bfee5e87c95d7c11b5bb03ff560e00c0edb67a5c8a193a2d38452ea48ba9a5b1b7a949e3dba4e3c29bcdf7584101f82810165e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574c6150b01405b281c74f119dff6fa8
SHA1f22735e7b06834fe6981d06d9c34783aa73ae4a4
SHA2568bdd4e8de608c1161660e3be947f97cfd45d21348f8199c74ef27cc567175be9
SHA512592344817861ab2801037f9cc076a6dd760ebeeeaab6e1e14eb30e23c7606a07c05ddca5517c901447052aca033af75174166b4b7c9b1bad66db7d85571a433e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515218ff29ecc443176cb7479059630ff
SHA1d1b59e004adbf65028e4122c3c02ed0ef0c5e775
SHA256139d00b2be735a14dc18e5452cbeb86af7b457aaafbc41c9bf0d4b2898afa46b
SHA5127a7c66edaa77b9ee69baa03b9577b265c636c589922f26097541a5b4a9796f73b7a977cb0fef5f105b6b121db7ff7f38b47127925ef7db64645c03adfa8eb37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b370eafcb318b0db60256f6a149e624a
SHA1b19d9b2ebe0d779c81518f6f59282878ffd7f345
SHA25698a9eb8dd81a048d2b0421fc0b9ac2f6e737c248c00526c7f52fe1fc803552dc
SHA51271a1a4cbaf6c309bb48c69401b5d540ceaee2846a988170823ea2b03e6b869278f373b5ff45863d315bd9476ec5cd2aa21b0ee41175302f86531c3a7aa072caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548eb364da54d443088ef5eb957d26668
SHA125ae7ada8c691a3d1a5d332fba1dbce413fadd9a
SHA25633af320254bea835460815cf62a7948ad13c5b933472fd83ad8c7cee324127f5
SHA51262e42e283a143084c60a8f00cc005864f9dfbc16512b7177ef505788f2987c8dd168a563c4d180c09f8cf9831466c9da2fd3bc9d605e8c086f37a984569498c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571035807f50fd2b7deabde02d2c323dd
SHA1c9d8672d98af563618401774ed7d24d39a2dc575
SHA256c18765ba30fdc8931032a81dd62f137f657de053dcd773ec633e7ed22470f84c
SHA512ddb276ffc9353d424dc7bb41d52f8b01f25c7d759c871254b49d136cf4b480cf67e689a68abca0b02212709f4de1b4561c68654827e3fc455746b6a10a5f353e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8bd2fe37e24306f94b995ff58231cf
SHA1f7990473fd663285051277812919096b44308e4b
SHA2569c30cfc02602cc6609413073270e6310c9c96f330334cdd7e3f4bf96b92dd722
SHA51262248d1b8a21315501313dd34d1f014ef3fe23aa21a196fdeac893810bb83fe5bdd894218c54f6e8c3ad93e28525dd90c64b37b9b26450ad989da1d68ca3d901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51535992a798c4f5cefde8141494ff4aa
SHA1121f6bf143eb4368a9d90bc67a733bfed8346c5e
SHA256e34b98402a5d143ff838a7fc5ceb3667d06ca4d428eecffdf6e9e8bf1578591a
SHA5123271da944e3bb655f161d0dc20934813040a605fa86d7268241d9093beb66a7da1f36c33da526d874dee73b50ddc207087640e1376b7deaa677cf5b69dd7c851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bac8bbbcc435ec695770115c243576
SHA137c0b71f88e56192a81476ef26eeed43b54362b3
SHA256ee1001d55fcfcb27870f1422bddefb8676121658b411d4d2ef46864a2f2a4be7
SHA512a5fdc339f780fa78bf251f5138b7a607b7b6d92595c2b15136ebbcc57304629376b70865de2c3c7d034e38ababdd96ecbf778bb56524fa6716702c7b63d17f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf219ec908c39c4442c3afc2e440b85
SHA14eeb839c062a1d1b2a08c5865119bfb31918c85d
SHA256de005d88846faeb756d8741916d4d644e5a13b2433d95636a548ce4779cbce2a
SHA512015125f3237810c3b79142c9155ed9b6cd88ecb9d9406987a1c11f7daad2478cf413dfd25703f3ee633edfc3ea60823d6541c24f4d5301487d72db160806da64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b856c16574ecbd5db421aa28b965d77a
SHA14f62f810c30c7268415c8b9609a98a3bee24c428
SHA256e1b7c7eddcd7e2fe8d3dcc624aa8e7c0cee69b60f2b8e4c1fb8e90d6eade7400
SHA5127b931910119619d1e212853baab11b6804cc7787b5849f199e9d65ac6d7303d4b1365ffc48a5e568ae2fe2826299eef8fbaf6c4f73471affd84ae946b0047acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d745c8f6c1e62241a0f5121282e925
SHA14fd7e9001e6236d3efa01a78077015b90f60935c
SHA256815e1ef7f820e4b41ba30f51bd1c848737e91b2d68795b1eaf79932e26c7cb05
SHA512ce3dce8520779c3af0889045c6af0865c4d1952a45875d146f05b0903f3ab367c567a3e068ca87b2d997195fb9f022916372be06006a6c37c503d084f0121137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1c67ec085d26f075959c15fe2c50e4
SHA1f1bee0214450f14dc05b6c3f237347f797058653
SHA25646217eb7cae7e1a4d6824e437800b4d1d2e7022254615c226c22d1e681db3e3c
SHA5125a6f856bfaa616061b91cabbaeff50981cd3d1e8c27f0c6736f8383602eb6a3862fc4240ffe363a4bfbb4773669b7dfc4ec73ae75a9c58045ebdb84ccd4190fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2aa6fa7aca2b406dea3d515911c028
SHA1074a25bac0cedc818043620466ef8dbbed608a53
SHA2564ec8d7b1e1b20610c9392daee3fdf627fb68f6640904708e6bc9208d2dd1a953
SHA512c3b2189584c68238556516ccfa3aed290ba845e274a71b32aa8cb3e0e20bdf9834031e78da4295bd828a496861100632f46767817df81613882a05ab1683a103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515af1f59ff6efee3dd392e1070a6dab5
SHA1c3c7754f6e9ed8d7af4ca4ce950c24c22f883855
SHA25685710848ea03a33ea2820a4df9fde32c3ee520206c3f62f5de1bc1bcb0931bd6
SHA5128b976edec967cef7033e2903c999280bd44066f9dbe35241994f7f4e5243b91e6a7e9dc40b208d5ebb7405ecf8342f3202aa4714bbcdea8083767b584324c655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72622015d74b1302b00e3272cd15d64
SHA19b445f93e7b62b0e94475cbdef21999aadcd62df
SHA256aff6fe36617664e23dd0d98da585b9020de1282aaa369f98a1d5f48af172d63a
SHA51238dc87bfa9fda5005df0285cf9d11ada5750811b8264a648cc589bd14b8c94b2f7475b9d7da6cc0c59acd55dd1a8c830e78bd019ae1118bc888723232329d683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1080654139c155efe63cc4f5c3a1e5f
SHA1cb097e996a86123a8e9244ac63ba95120c2c03f5
SHA2569805dd9f788fd5cb4a342b1bbad58a6c099c4c5e215a17fca57ffb176443346e
SHA5120b0d8fd960dee8b5168b8e50a4a1eaeec7ecb818604fec37a0f53ae74b3d5cdb667aa2b88769b1b820815b1739b168207af1e830db23209800f04033d9f3ef81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724b7726420658c1632248f7059f436c
SHA11151e522795755ddcb0d23923a3df4a22214af49
SHA2568af2cbcbf8e0f4cd531004de0c8236e785bca6e71b13b44c50d489587b73ef6a
SHA512fab915c1acb959c6fde7b079a7c94fae18e981ea8033a291d8d05e48df335bb6fd6a9f97f219d96cafceb0ecbf391ead37d3bea55782ba074a3855f1fae196c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d6acb7c1cfb4cfcc0e60e553d43100
SHA1000af800bc5d62b5980089f127312eb8b36c8967
SHA256efe9f12579d52ad942c0d53a17bb7f4dccf560fccafa337c6bc4236bc567887e
SHA5126c8a50efb14f224e91d9284568f0fb37fc6653af0fb897675ddfae3ab09378ae38d30858678634ebf20cd3b6aeb5aa3575b9d26f9d808ab063bdf1253837e71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577c3498ece42406710d09a005b4f5ace
SHA1d656598ef736852d9a2fdd506a1122f923dea443
SHA2561937a0620f76f06664ce1df47f5c3cd3dddf0a09602c9ccd585745ad5c807223
SHA5125d9c5558ab5179570048be97c6af07723cce545a08547b159f4d47f5f6f9cffa8371ea963dd41b469969a0757e4add64e2cb9f58393233d4a9cb348ccd72e5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530230ae360eb47e76ebacc520e222daa
SHA1af5a5a9b6585eae06d7b9d4b2b76957850ecf372
SHA256f8f66eace29fb42f9d405b9d8f1c5bf73479e24791c8e8173c90129a19b0db42
SHA512f9ba4f90e6daa4e5a008f0fab1155b04c3e8f43825591eaa2ba5e1cfc8bf129d8a0711ef98ec574f5cea40ba10558898d6480f47cac46444eccdc5c7071b04db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b