Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
bcad4edbedecfbce73a79fdad8549ef5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcad4edbedecfbce73a79fdad8549ef5_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
bcad4edbedecfbce73a79fdad8549ef5_JaffaCakes118.html
-
Size
4KB
-
MD5
bcad4edbedecfbce73a79fdad8549ef5
-
SHA1
41e4e893c3b09c2e16961c963960621d43eb985c
-
SHA256
ddc5d84e414abc5256f09f5b64ce9ddc19094a6d50a34d14e0de216721d1d662
-
SHA512
a004ed5dd81d04c42898797f3ae252c44a5dba652edaaceaafd24c8ec713933b05a38b120e40ba2a88aeb291880bc3778c71c00870c34360851c3650ce5c1258
-
SSDEEP
48:c8UfdvyMFr3j/9jJMmizqF/37ZDFQiCtDfSMG4XugJASRBxrusz4LO7S/kmpnyV:C3j/9937ZDFQtufS5rJw7K
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc5000000000200000000001066000000010000200000009321c9d5233958e766e3df3c9341c658092844445ffb1fd5e9794ddc1d7372fa000000000e800000000200002000000086d40a3573b761bf23f59ba67719a661dddb055f7ea3c73607a54987a44ffece20000000d0240592eff9f17f66e5376028fe324ad84a224bdb69cfa04467e39fba8101554000000059f5250a7ca1d8736ea2fe571b14b5e3fe08ea86a0c1568097ee41307965da3f621f4f1a4de6df0671519ffc2c126380c18aef2355d90b3cf0782ef58d0821ca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418408778" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0eb2768aa86da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000a196d9e21c459c106e59ee80faa2c687a65fec3ee8c60ca214bbd72f8aa23f26000000000e8000000002000020000000096bd64a29a8b4a3d10676ab87fc6de10f8a23aa7d3c4e9c05a1f1b70cb57750900000002b5a1ac24a9d13d3dac10e8bb5973747c5979a879fa3634f1575d875c7eefaed16e181542260095c972909cd4e3d9a5c7714e5d68ff8e40980964a10e9ef3cfbb05f26d216923afe20372bb2837ac76d7ccce19a90671c6e8896a5d80db20d5b19a00eba318fa9cb3614dfdb507038d962529d6d5ca344395d5c924a3965bb6ebe44f71d91d4d3d37ee51b43bb420bae4000000064f1c3e657d46a1004341411afc44a8982bfc19f8e394e35461ac5256bf9cfdf6d9a8f1d51d30b9d664e2b9033b56b86f9fbb770bf97f3518964e0d5f7b3e088 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93781DB1-F29D-11EE-9921-5267BFD3BAD1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2032 1708 iexplore.exe 28 PID 1708 wrote to memory of 2032 1708 iexplore.exe 28 PID 1708 wrote to memory of 2032 1708 iexplore.exe 28 PID 1708 wrote to memory of 2032 1708 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bcad4edbedecfbce73a79fdad8549ef5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59059a76912ae1b4f28b4b44822d09c4b
SHA125e48a06df8c21ace0023b53122a03cb97514a7c
SHA256ae6bf3d314d6d988adbbcbb3d560d4b3bd601b71a3570bafd9c112433a3bf64a
SHA512c379a52576723c61b890be6f8b9f8649f77291a25f153cbd51b294c6ec0893be465490a4f58f80ba514a553adcde448ae09a0e846a69d92c75d49601944d31d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccccddfdb986b1f9eabc8322c8fc5d9d
SHA1068d0b52c7caf1643cfd86fd1d2d19d3d4650aa2
SHA256d0b2ee97c88c84ac379ff090f2ce56f432cb356364ebdf71f9c9c4cffd328c9b
SHA51278478165116b847f6c3f1825de456df10b6d188aa28ed6237b7e16cb25d4bf9f77612baea4f09d7b3d481fcff0841ac942ae5521fef7c3ba2784e1b783870d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c2c802e3b90979ca52714d2a0fb7c2c
SHA1a038513dcfbedcecad2d54babe1c73640448a911
SHA256b83aa9ad0781243e1826f5e2467cd8c853f5a5d70244ec2b79cecf55bbe568c4
SHA5129fae44657cc62542f23a9493fc7e8b142dae8903f41bf2e9f9b261cfa9a5674b8f6d60e8c69ed916fbdcc80be00d177a0309096029ecc52ef7478134f86579cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5213b72870a2cf248b9e5e01c74b768ff
SHA129b6dfaf081f3273e1b57c5b1f3afc5e62d6d5fc
SHA2563e9d3059dd14e731b21d627a33d94ee4368baaede134bed269e615ba91dbf7f9
SHA5125d2cebbf1a90cd34d2227dca0182ff032507bbabe57e37a1180db04e7ef7b59733b24ad48fc24cf09441c893930da25daf18f98fbc2ad4a15b282c5b97747fdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53784881d79e682472c7fa5226b465887
SHA1561e27fb5a027b2ac7b5acb4573c91a6db5afbb0
SHA2563964a0743831d390c62f151e303cdac442b885b32b2857316704879f9273d792
SHA5129ad753a41ae985597ae341693030d3f271f6ffdf6feb0f2f72a64085940cd17fde9fde3fe4b3041ebf63cf0e8c26dc7446859b95364f6fbe6a6555264e86f8b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD538f489d79883f6cb0261cd6beeb7fbde
SHA177db89f06db6a38c0fcf744f8574cd918c933938
SHA2564f57996ae1074f9124ca6b172c74fa717f78b6d7cd21f8b74c3e090eea9c23e6
SHA512e0035829bc1396d5247222af28b70d5e5bfca931c68e98f815a8e0bd7c0f2cefc621cc62041ed2598f960b7ca63f6a5826225f0201aa3673d2402f6b9cb8bc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510c578ec69946b478784b8899a51642
SHA17e9a359e3c8fc7d2a0d05bc5afc5db83ef303f48
SHA2566a108273ebb0db0d3f0edf232e7cad588da7b40e1f14723e32e92f0d7b30796a
SHA512dc2255b341a92a3e8d4610ebc7a7c897443714a8866fac388215fd5f0be710eb5d16dedf733da8f1a1a46c3c6a8bfb0fcf0211e08c854e21263bb241c908c101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53291e3024a11d0a941561850a3b3d347
SHA13b30ae5c40f24802ad12e9831396e26351899fb5
SHA2565e730aac153cabadbd49ab7d07a9da0d32539569a060864a6693bd451fb04653
SHA512d889c7aff54cd782f7bca4631dbd0e40a86fb62d400f09a35ec21aa784021f8011afc9fea7d6ec93f8f72c2c8edc45f2f26b5d08b34ebb91d40fd1cab745a499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5271a475346ddbd17acc07fafd4a47b11
SHA1289bec469603a268af5da206ac1701ead96601ef
SHA2562dd0a3d4fdb1c190bd3c3c1926b94c56719f0471c43571c5758f23c407585bff
SHA5120841f5f7ecf9c3e3361f881aae190f7a5303db09f1c34d173652fe3419850e2ba87863d7d81fcddd0e34f66b50edf0f52b674da92de02ecf8103297bedac8bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a1439179412e1038ef05c88e3e8a03d
SHA1f857d511492ff5348c8cfee920ed324c0ebf2a53
SHA25675397b63872360a0f57809b9e3f38e9d095d1e8ae612299da959917d84f4fe90
SHA5121d076e4286fe32c42ac8a3688ad0a4bbc7811ecc242aa49b91e0b4cadee92f3b6a214f60f75f6c6759070c7ac8d338a2a3d303ff9e80fe56265c030c81848c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2e46eed435066675ea1b0926e8563f3
SHA1e528f5a060e42a8d2ddf11455f1119831bb379f9
SHA256492c975768b6a58d4aa32ea6d2ed08a9bbca3aeaf082403748f568ce8ce167f8
SHA512d2cc4725e366cf7465aca23b6d202f5da6cde373836fc57576b8b2de617de6deca3be0c576f7a9867f2f03f65191677e6e2c4f557e531ca15f0172104e96e089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d53af228beab65e6c1b644f63a6d492
SHA17a442a72a17bb3efa24ff6bfb60efb481408dec6
SHA256871503609bf0d2fdc2a7df7f6d56a08f152449e350e8009da7c36aaf1153387b
SHA512271928bb5b7366b65136a29cd3c99a5bfa9e489ad889f98353387fddcc44ae27a45cc0a4238f6d9b3c64fba7c28143cd9ef701b2a8fd9f4144b6e673e59bfa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e37cb97a3389eeb10c2745f58a72d5c
SHA16ecd25fc5ad6224aaf770d94aada337f8ce56309
SHA256ec26523ed1128a7d87ef2b58febd4d2212b2c8a65422edf7185d22b4dcaabf03
SHA51244f1e70ff1914a409ce692a990dbabc21515f54bc516f9cf7bb5edbf4dcb8ebd6101556794a7934fb5696c3cb55e9a219225e93b06c1dd31ac33fa82f5e5ed56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5512ca9323749a31514e4a53397cf4483
SHA174fba6da04450183a792bb582a01ad1eb7cb2269
SHA256edab2655d9985e1d63a67fd551140acfbbfe10eb93fe9c3fd354e1b165f6ce0e
SHA512ed452ec18b15a8e4b9c107bb8a8e28be6f866addc63c503e51554982e62fbdba6decb2feb7da8631663eac8b03ec6a519d6972d2630799ad7b828e62f7b03854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55747e6f26c8492b6ce2af4d6dd385733
SHA18e1ad408c953cc10082547954b7544ea140990cc
SHA256b13d63299e3c0cfa736a18fe302799fd4cd7c104f36dfc5ae0692a7456bb60fd
SHA512f2b896ac3f80b06bc25be3edf8ec5adf94e10abaacb0592fae722e9cb84639aea57303b8a8eb51239360ede21303eb16b285a4345bde10a5330da7cb6282fb07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fe41fd5e646823ba18a1c19c6472a39
SHA12d852dbf4ffee6615fc0f0c4ab17df18e5e55222
SHA256c2fdf4fd28a0a5d73762e645c9f872979c991d30c71e05496ec43afe7381113d
SHA512770d0cd91520d01c12346ac109151238e263fcf4bef02b89cf12b555147e68009363ede50c5e55f3125e7cbdd2224b1e0694b18988ddb53ec83f999d8925aef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cb950ac112d6801aad62f4f2ca1804c
SHA1204c27d90cf385d0151800701b6fa49cc02e1194
SHA256e2b65b770ca34ac3d5227eb9ab17daa0c2fe593f954d5fd50b18ce46ede8ba48
SHA5129cb7f83549b45d96f488445053dcb8fdb53fbe149d4c4c140769cd1431ef90946a0e0db89b2e5ec07865d75f42dc7fc3b459325893a6063472075dc88f261096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5953e15676e2cab9ff00e0d47b8f66b
SHA1c9a8daaf3f0cb96805368cedc6915fda9ed82f58
SHA2565e4a9fc4b6a441984cc7b2b75e821c3077779c1e889bb44767d201d3e68a9c14
SHA51224d661acf5a3de3d63f664193546153e8412ad7b3d574d8cc89c0022e8fec0e2f016f90e42f5cfa617e102534ba7c12727bf77a62dfb22f72adbb83248467511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf4465905a018ac792d5d22dbfd78f11
SHA1761594af3077bad9c30509f4b5dfc112c34718d7
SHA2563b69b4341af630f138f1d907759945a7d14c4f1e46c52cddbc5f3897e565b028
SHA5129fd9a9012a689b380d04a0c996af3844781c47ff634e119fda35245c7c2e63bd1c75d82527fd1d6cd87902ff84022c268554c42816c8f35f88837ed0e59885f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769edee6a3d466525ccabe4f7a5fda04
SHA10341529c5cbe4d34b70c80529d35823babd0d01b
SHA2564885c30751413513cfd0b6d25bf4722d7ba97b4d9fae2f563dcfd427d1c118d3
SHA512fc1ab229c392e412cadc3b8944a15cf331767a9a3059bb5726e2f339fc1a1486ddf0f7aa30326fec20e0a9bef1f03b7aeeb522d5638b2bcde052a1743d186b5c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a