Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
3ffe9dc555c15afbfefbae64e69c7be3_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3ffe9dc555c15afbfefbae64e69c7be3_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
3ffe9dc555c15afbfefbae64e69c7be3_JaffaCakes118.html
-
Size
461KB
-
MD5
3ffe9dc555c15afbfefbae64e69c7be3
-
SHA1
1b756633f6463b7e42badeeb298e308a7809602a
-
SHA256
ea167ec20718751adcc4c2e858d3c67947ec6b48219292d6346e210a87bc398d
-
SHA512
141f87bc48422a9e1f38c17f63ff3c41cd94ba0af12ed01aa56fbb57a950261e218c53bd492893b4375ba40cb247bd5a8a4bc30961534964d88feae70ff34c4f
-
SSDEEP
6144:SMsMYod+X3oI+YosMYod+X3oI+Y4sMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3k5d+X305d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000084ad008e2fc7ade0393fa38912e0ed07ce95283c857fc2b40fe20a30adf95e34000000000e800000000200002000000053917f064c49cae8ddefe16c2ea36813dacee17bb480ed3832ab2b0d27d58527200000000bb22afea38243de26b4f6a38a1cd6314172d889e6324c153dd7fd275c205cc34000000006aab0b158fd5dfe82ab6971338eef62e2fef042716c3ad60494f1665450d5945913960c7ed40199bd22d4ed4f5c4e052e9926916ca892c733356bf927420657 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{377310C1-1137-11EF-97A3-C6E8F1D2B27D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421773299" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b037f70f44a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000039c98028c94b95497ed8e9f7707109aca63ef6d9e8f596245bd58652b873e78d000000000e8000000002000020000000b12cf0d193cd4c3ff517cf1e2017695937d0fbcfbdcd5ff77ca8b19da6ee48c6900000001921902730be68b9dd1638ff228a18a04e04cf3948f63d8f5605128a8980b40f8f67ced0203eabcd67cb1d5b3a0b45c1d5dc8f183679a1e92f083e0ca8a39bd8a1fe667e55bd6ee18bbae6445039685ccbe9d73582d6ed63043624c7908d37b07b7818aa3bffeedc916e6cfbec63a5da52e9cb2c797b92607acc08e64207ce13864faef2870dc567bc29fc6b21cab03b400000000c07a5f83adb98d9b9b58fba01d078172bf59b10ee3179940c6bc0739343daa0032036c8fbd89086fda8416d27a9633f48be3b6a50966b9e7055116f7952e01f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1648 2428 iexplore.exe 28 PID 2428 wrote to memory of 1648 2428 iexplore.exe 28 PID 2428 wrote to memory of 1648 2428 iexplore.exe 28 PID 2428 wrote to memory of 1648 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ffe9dc555c15afbfefbae64e69c7be3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a0eee0e00b9159b6afe6688f07627c4
SHA1f7fe964054c795e1dbb772e19358a5de6091e752
SHA2563b22b85853a2c2f514b26fd36fb969e5ea225c8956a76e944d04cf937078b2da
SHA512a99e4179e5be64a3ca25c287c339aa2bb0456dad378964132ee98c566abbc1a3e74717ad0feee83e50305efa2f1840ed889f4b5fcb5bbc0d1d13d7b3bff7b8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d06c0d0a311d3116bbc1ea5943885b2
SHA16f1ec6ba4fe64808f8915a44461701597a0d7a40
SHA2565a3725774fc6b17b3bc9e92488668fbafd76da7387f1ceeb8f93257f58622329
SHA512683f8790d42b1037a5c6184ea68233b0b2de06ea4ede7a2a46f01ea189b6e24cd7f849f758620bee02e45fcd4e56d893b3afe3a4f917246e2d1a4b741254f416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b445b567e0e5cc994f33cd26fe2d7049
SHA16ff17bc1f9e1f42dca480dddefceba8a46ab156d
SHA256b1940f2409fa869a6a7488270b2015b182669fa78d8b5fc65e4dbe520ce35a5a
SHA5125cf20ab0d76810a0a56e427f584946a1ae9ceec82182787a227fbbf5a70bff3bdc24d685ea1e75b14729df6e988561f895bde96f124b96eace6cb52f8da02fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5085922bd78b5296ed9b849a256893533
SHA15d36f5618331b3a75de56471a818744ade3c1685
SHA2560d2aaa1819272684dd805d285ea289e1fec9faede4ca5e412e46ba1acbac13a5
SHA5122c0adc6bc1d5ab00f4bd889e263aafd68b10ad7f4fb7d7f57dda60798748cf31e247f14012180d7ebc3eb0f2355d80c204432843a82f083488d029c50bc17cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b24b14a1ab15585fce9faeec6659bbac
SHA19e0616e742dae2018282d65329d4da407d0199dc
SHA256ba79c40201eeb98719bf7791fae855093d66423dad442a66374b03a04bbaaef2
SHA51278823e18cb45cc916ace322811efea3d2e8d8258ef59b45d2add539ff62d27690ec36f5da947e58f2548a629f850b23be61043bdd8360549ccf9961b7c1f523d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b12c6091f3686cb42f7eeca3eb7c599
SHA10403df5134912b42b9db6d85da5b194df8d38f51
SHA25684be8d907c28e8340d0e9152f9ee90815fb24e39261c3097aa88b3ee931d3cca
SHA5127325d000a026a3852179613ffe2a705c8977c354d6e871d59d98b33c0ebf82677984d7e0607d96a1de5dd76c15061d66755aab1d29beb5ce0708c48c23b43d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b87edd0076036a3543f14beb594c4d38
SHA178aa3b130cb1bfc30270731d48a6099f7ea24062
SHA256622a7b037d8d6c45b5f9000cb516476ac3ffd2cd85f46c3e377700f588ce2091
SHA5129ae642605bad61bd00c35ba1cdf117bdb02b90ac0ee03ba65671dfcdb5a8a4c09bc946e63a83d526e7e963565900d4ce70eb1a984b3964d5400e05d1135110d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca18ff3d9c9987e4f80069e481f4e6e4
SHA1c0284f7c7fa73bb7cc53ea260f2a8397e990ceb5
SHA2563b8fecd23e3918764c63a13bc63cb58ffcc132f4f06770933c7fa4ece3e3c012
SHA51260274ba8f8acd749372b55aaea5d03275bb038f54aab87e4198b11e47e8d51d463728f033f070d358f37598dd7cd1f8d2ff8cab2d285b49100b7ae39b974a4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bdd19bd8c23688f6cfb081dd6a2819d0
SHA1ce90d1a87794e19d4c3bd8cca5b2c872057aca60
SHA25601d08091b5fb3d40a197d5fb74b048671a42e4b88194d5639b18b7d66e7ad2c7
SHA5123661695196e483381a3f3cf21eae97a4d9ef83ff293944deeae1c01b27354e0236296ca1be50f2f171abcd037e766f50690b034a1c02513eb01bf5a60a497643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf092d6a8add822060eb3399cab682f2
SHA1ff40055ae291e9914c715f816edaa714a399d129
SHA2568bde4b1e7c19ffbe68866697412fe67c0c29ea5d3c75e60d958d17425e4fd299
SHA5125416c89e81432c9ef4bf36db4c74627ef241c0fb902b8bfc341cd92bfebf97d4b7a12da15b5e6932a8fa8a3dcd61a9cf2b744ccf9d2ba60c26b9e508c1d83c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5bcd03dd70bc47e309bfc19982fcb10
SHA16c15e9237b4861cb373becfd72498d388d25a254
SHA2567d72311b913ebfc59fec851872247e6c6fe3cbd13897521087725273e5f78e8d
SHA512b8327aea6648c8fdcc859a077cf63c28b5d80adb689518d6d7fdc4ec143ed03a5f1b017ce95b7d65e4a94058fdd6acbd41f68450b2f99d2cce01644f8df47fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf7358ee83c727f5c7c9940f8484a79
SHA1e54744e3752664190f0b00eb25eac860908f4e80
SHA25695055451df432958c41e89d078b5e5524fdc568c7b24e11da443f99bf8549996
SHA512582ab91c83ae05fa18aefafd9e311bf6a832dbed39b152fcae6c9979e90c817870a946a08ae147551f07328351b40f44e033a6ff8e2b254b0ed6c4a3a4ad5a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0df7ed32f511ba8d097386e64d4a76
SHA185919de78812a445cca37a350909c5d5029e0ed2
SHA256fd89aec144ebcaab305f31c181018f52c04e25bb57e8a5fbc0dc0bc6d602ab91
SHA5129b13a3ffb9580f97685423211f33c64cf2be724bfc60153f34a90d711e2941f02564dcb0a5e34eba6c9fde7413599e66333065ae9241ea776c56a9334631946f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee912e530a5872a84da81a30f99ae31e
SHA1d5e5920feae6d7cae9f671d2888877f8c6a35d8e
SHA2562adcba2aae3130efd402cc69bf2cc9a2e30baf82f2df31ab58834e552debdbcc
SHA512656b1b21d447bff55ecb9b10302e301eadb4adef7fb0fb6e065dbcac25a80c94ea89d77218bbc7a1e9cb4608226f1ac03d554c8ac810061be1372cd276c6892e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a0d3ce330511074cdb3509a30652215
SHA18bf199fd184ccad2db8bc0d8b36c752640d19289
SHA256262e3466655e492a6d4d20945bfc5e0b0b557a2b47e8340e174c1022334d3c68
SHA51236047cfc3ccc23093b0ce507ad9e27e4ad51198bebe72d403276482f74e6b80e988edec932129fd8e3b9f7de0e34f69c23a5bb202d9abe1c0b97386da303a520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0572df0c4736ad757b3ef0da3c2cd5e
SHA1b6dcd3b6c95e2b0eaaef3ccd1cacc4fa84ed3d53
SHA2567d9820c3b40d2defc778f008c6d6a34636adabc4375d1d54a900ec98f103873e
SHA512bb5c8837568092f6c47483329d8038a61aea7774c4dbd55aa2c8e00abca22fff8f4aaf2b46fb98d7c0652136f4df9350179fb0e261f29cf469b284a6611074cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e388134660bc98e5e7ecb531b7d1d2
SHA174bf6d72effd178f6b96d5daa0775359b0f7ecfa
SHA256b0a97562e89c25d643dd06016155e862def324984c2a89042ad9e82cd194283d
SHA5123656be44cfb46be11856557eb1c020ccb4769d3412922a89df91bc9cff811af8b87968eccc9ebfc7b2ecbf8ae899865a4b002203ba79514a43cd7c89b969c929
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501962ea91863c00f07d69d097111c522
SHA1b1c40d510e1fae3462f0c9acbf7754612b2ee7a0
SHA256555b262a309d19795f7d9b68336f4b74959ec93313fff15dc2a40315f7944853
SHA5129ed01c9f4a09352ffbfdb1e0b950c17e7c74b9f372c6f00c77d1a3cc68f61e0e8d17f8cbb72a6c4a6262102b865bc27884eb279aafe02f9a29c310d7232b8319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b4d96d8af0d2e5fca72a32e4f029424
SHA1c5d927ac160699e2d81b90922a4794611e188d28
SHA2564d45fce3b192ab10b7e7cd3d32be2568b03d64c44be8405e61f249da7a98f24d
SHA512f8f7bd8990036c25068a1f58d9d1e0b73bcbcdcfd629b81dd3e1cbdf9a4043725dbd445edf665dbecd9235eab02462694962e5f03cb232b2290a024359098fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51323ee33c7e42bca12ade58409615f11
SHA1ff191421613fcba207c371f3da194fa4a9427802
SHA256c6c9d3daa3e2202705ad736f497fc451593995fa7ada9486eef345abb6ea00b5
SHA512aae0c6fbd21b1d19d1aba4fcd6bd9a84983bba9fbe576002a7ec3daca41fb054efac50b00544dd682fa7532b8818991d75c5d811813802aac60b5e3204206f83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a8dbe04a737f6bdf668f3b1d9acd181
SHA199573f7e4d1bc6efdbe153b78d2685b7e5bf29a8
SHA256245299447a479924a8f86ab30afd1e4e65f50a9292d2f19f6f5f207d3b945446
SHA5128a875bb7423e7737b778133d5d43b687d3eea40986846eb02b89d12ba56e9e4b6f5796d4afaa0d976726897241c0dd2bb8094983fae795e363c932c7a2aaa50a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a