Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
6d39ec2c526d6a3f9a74220b9ef2ff97_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6d39ec2c526d6a3f9a74220b9ef2ff97_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d39ec2c526d6a3f9a74220b9ef2ff97_JaffaCakes118.html
-
Size
1KB
-
MD5
6d39ec2c526d6a3f9a74220b9ef2ff97
-
SHA1
99cb98a15e3ec6592bae8993733b63ea0a397c40
-
SHA256
06cf952e4fc6f78765658096e9449f086892309626d7835b2bc87009c5b7d8bf
-
SHA512
236ce0b031ed1fe8e28a1f451e9bb8767980976af209a932107cdeb22e89d6852baab435cf9f619a6955080bcdc673f10fd4dfad5fcb48712235d141731c2c06
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca6542b595d6b641ae995911a0676cbe000000000200000000001066000000010000200000000ce7d45addf5dc0c0e97fc42bca7cae9f1d43d9df697c71ab73d42022b3d62ed000000000e800000000200002000000055ab09f13df5d4798693413533b4e6a99ed12ea5810983f8ae61375188160e2920000000aecf9c3d0787bb35ad6868ba46de2413469238618e4faed0af16134598e26dba400000002c705ac9ebd383eecd06e0d28c2f40a7c0e7570f6c4326d166e35c5b8cd2beee0ed552d1cc79d2f562410474b366012bf23291d962dfd8ee8bddaecc6a611d38 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25969021-197F-11EF-A4EE-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08c12fa8badda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422683803" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ca6542b595d6b641ae995911a0676cbe00000000020000000000106600000001000020000000dcd1578be74bfa88e86bf372e8998051b081be136ef4d7252799ef8e49851575000000000e8000000002000020000000ad9174ba0b0a54b6b2c6486d2254cd0a69b22c07fcd0fc8df04f13c6b3eb279b9000000052dc6703a3bb7c575eaffa19258d63793e37b01b1b8c9edd98a5bc4933cc2fa9ca5b0a98d76e58881f9e4404ea11c97b8a5e37e00ad49df0ed39a2318a96a445d3ccfab294e1b39bdf4f152e4848cfd858fcf57a7f75176690ce3fdd7ff617f45e11f60f0d18e79ffd1049d2ec80daca9d9f386bae9e56aa3f7d615d7fbacc3aff1cb4546b363353122efc2f8cdbfb0a400000008ce4ec7abf855492391d93d84c7fba656b78e6ff0a130f52f65bafc91adc4b1b711fb564660f82d9989e529abe40ab69e040ac0bf4de06ac34c09621ff556001 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE 2236 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2236 1716 iexplore.exe 28 PID 1716 wrote to memory of 2236 1716 iexplore.exe 28 PID 1716 wrote to memory of 2236 1716 iexplore.exe 28 PID 1716 wrote to memory of 2236 1716 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6d39ec2c526d6a3f9a74220b9ef2ff97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d6fe81f48e14d333bdc6ccaf9d090e3
SHA179135447516baddcb984b68143f46c99bde51f0c
SHA256d474fa7b046c1020e441a2985a5a6a02102af4239d3712671ed49399bef2084d
SHA5124c696ece02789c50844eb6577f0e851a21f53717fc5033a1b5afab7a23ab36f858d8d95116158d896af3f58e78755d5c3cb5db18e603ad060560c5e54e57ac52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f15b1600cc51a34a2368c87c490f39
SHA1b080bfbd951e928c9a15ecde1d6b52f2dcffdf99
SHA256110995b7565acffd596e129d0e924ac147303a4d9c72a1cd47e1506e8d777440
SHA5125aab7cb118d16e12778d85a56e85d50b03541168438bb00c4e588a0e6e2b6cb10b3133e764267cf442be76bb4f02cbe72c8ef931968642577077980b2e1310a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58556c8008b0d05d7af7cc140de0bdc13
SHA1aaae07a4ab33d03cbbde2ad025b7b0de4e293af9
SHA256fc2324e928e961db11d6b53d66562423b8050b3cf0c30585908b9b7efde9b9bb
SHA512bf092352ae6ce80030a8870db91e66a4763dea411b3fb8aea1c7f02c04feceecee9973128554d6196e9fe05f4f5a600b4d14315f1a1622784dc482e0acda9ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5442749417437b97f39d129e7274fbc1e
SHA16d82cb557ab527fdefc3744031f97e7b77632b03
SHA256c0cdd570ed1b9aff7840f0926f98b6195df91fabc7029ba13799495389e25aef
SHA512c48fb1bdd79ca8060cc7d6f61ac6bce49cd788fdb19d005cfc5aaea6528786b3e3a61d978dec0f2319e912e9d52f9833eb8f4b59078f0bdc9a08845104e72573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1757c3358685d6bdbd80223e7464b55
SHA1f9bb7fcf1303b00e92ef235187ed87d79beb4585
SHA256bafdb557d39eff41cbbffddae52efac0c6e85ae0496219731322a292678fb8ea
SHA512660908790137f80dc53fb1cfe24d1130bbf334a563fdd4b9dba526b051bcdcc83c9be4e9910bf152c0e8c22a6dc46c817a31e1fe5215db87836132ca6211336b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d39f26190e62d9cbe3c00e222fab9663
SHA1b6eae4cc39dc84bc8685b768510f924272a89003
SHA2565a473a2d5f6893fe629a406e2d8685e863bda025c9e49e0603102efd47c58f34
SHA512d9da2ad68e8ce491c08bd67fb48b5b1ace3de10d2adcde05d4b4aafe5edf68f9591cd39e69b0eeeab5f662cf9650c6f86bf1c755a77dd0c5183ff5124fbb2b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d34e4c480739b3e69076ebdf2f015996
SHA14d56e78cab2bd0599aab9a704af8a84219625435
SHA256af81b8fb9b912da27d5acc670e36a9e915cf1f1969efafcadbd92640c7823164
SHA5125fd69ec7df97f4a917e350f23fadbfcb6fba5b28dc68af8ad8bbcb3b73147ef13eed4a29bb39d8606e3a89864ad08418962c1e72cf04d68db8c0b2f2e6f3aa78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c7ebde350c1d920c7292942852d621f
SHA169aa77d71ec4c009b41cd74af098b87fa6a277a6
SHA256cea774cddfd94b89331350e121041dd0464cd3a7a8997c2ec700de08ddd1d530
SHA5126b284dbc3b607e6e66a54abb32c91d04b2ea21022038a506082724ad41782d4c703d67e5d7463fce95588d8a6c09a78fd75fe8b1762aa2a25a803c7134dbce94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50578dfb768c3e8f476479acf883a178f
SHA1ec490a99445ed7314a8dae848ab439134ef92e7b
SHA2562c9b9fa3e619dd013d60a82eae70a59b3d228812aba4727115902e7108891d6a
SHA5129a344ce98d616e5eaf4983c4ef9d4e349feff4a657aa1583a7c14b6a79adb4c33de958b6ae8f4946ed257ca8aa0dd5caecefbb6a82c04bd6177fdde3ad563773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5339236f1eb678b93bb8fafb0317c374f
SHA1c5a93b5ecb25f2d8a9ca6d20a9017de80d13a70f
SHA2560787a32791b43ae776e9a677102c561837b3f0b37da4ff565d2f63565b9bb812
SHA512adc8fb2f71b14f0e30d5741655f1aca7eaf83a1165130de6c2e9c315192e76671c17901df1ca1df64c07e6e09bc8c8b629ce567d16b3724d3bf5ed7c9dc8261a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550ad18035aad9050f8a543b1006ce870
SHA12d4f74e809ca46a6df872f882ea2eec921f32dae
SHA256cf67a3821a8a9c8afbe803d611e16a5d503485324e8ddfd56442fa6f282c82a2
SHA51285d68a5f0e60dd8576c4dd2fa5cb1870ab09ef0833c410a9dd7c94a715a907e41462a35385bcf38cee111345d5e0b3cadfd352e59845a6aa84cfa450ffbd73cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e2e06c5ff6a7a4bc2713b4a26158d0f
SHA1cab2cf02f8a70abbfcec8de1179fda19cbc5f51d
SHA256b59e11e6aa3895332bc0a49ad844e7e3a7a2f2870e20fdb62b1486ec6eed0bc4
SHA51254e10e9a9aafcb863995c924f9523d14167f94f3f3b29789ee9b4a662e7435c54f754333e683023569efd0b94df79f65209a4b78cddc7c6dbf8ab29ff9892c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53817565d874d7909b6823d46c0a21918
SHA141ccc5b148fa80c472bb90040aa56fdfe16d9055
SHA256a513b3268918eac76aa23bce90a5dfd9ef8101806dee33f3cd4d4e8a468786a5
SHA512e5410fe577ac0b046e74d6135e13449ba99a68ad1fab9f2839a4f79757f193d837fbb107de5b87c668655b3d67ee3dd31f0d25dafb456cdb46a4c89ab0523e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f989268c4913bb4985a8d721cda3f11c
SHA17e3e35356e4e56f23dbd08cb5f6b869dee658980
SHA25626224d4c3cafc302c14bb522d8b832a4d15bdf20b594561cfc61470a8f0544af
SHA5127970ceafa0ceaa11f34c9df9a1e10bc087123ec2dce8cf67f1186f8ed852a8cd58d15aa7eb20dfb1cd932e851b598b58795d729ae9c8da3ac0497e992e6c2928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7ba5101d65673f4dd8852d4c4781ff1
SHA161e0e9832e26089f920c1ed226582772236c28da
SHA2561287d3178c705fb8f3c8aba7ef35725d81174257b013b61585c8a660226d41b4
SHA51294078b105df31a05080306cfbdd0bb1d50387c6ba5e4c2921080f946ed88ed2ef865cc0c31a5d6f7bd28e6908ec8e8ef45c196b7ba8aee262acc92d407caf485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5561d18389d2293c088d3bddba0718d12
SHA14ec10b4cf2eb448c9be937d4a3d7b321a10535c4
SHA256ecbbbb5c1cb6d99c56ca43f347a11df65981331f6f842dd2d91379520a087f40
SHA512ce1ac1cf974cc744db113d6c59223c73c18b9779259eedcf5330fcf3d4748433cc542441fe15a26fd70930f8d959e355f9107c02d4b68206f08ca3fbc2d85ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5427c271953ff4e2ce840c438624e1346
SHA1ec540c154da04c2d23bc7d16539f5a3b314b1c55
SHA25657faedfe8a784dc40ede340f4f205c3f549759c00223df40ab945ecb4daab524
SHA51276e66745ee7d65ab7f8a0734118584cd10288eb4dc68ff9a7cccc2497a7cdf37da8d071b8f45702a68e4d1ca135f45c5bd180f04258fef140912e30da147a3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad2c58d51c9c2c2a188bc766dae5e69
SHA1564e13489159459b73ec7dec009c7a4de1ffa8f2
SHA256b86054cd29239360e9aedef3bbc33bd63934aa5099d0a18d4170ba54d075d916
SHA512e472b39cfd053c8e9c57e2c83bbbba83d6920515b9c1148530b5e2785669ebd2856a2a9d8ee447271a12930a5966f5c5aaf53a3a4eba2826048b400a4af13ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b310b38702b9919317c11f562e6f6f3b
SHA106593ed09201a67de2e559bb2a4b7695baa0fd7b
SHA25657da305dd8b08ab5fdd9af84af87ce980242a6135b56e3fae6922a2d160ec8cb
SHA512649b2c44b478093e7114781d840f77b91cd0fa55ce531845b4bfa7932164b2f7d0f5cf126073cc099cec929a36d96f0f065648083b3ec3494e47f6d43c90b2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed8b5413ae637f7421e9ba8c7be0b73e
SHA176b091282d95e7b2aa41fb66cd89234ec348cfd8
SHA2564455cb30a6ffdf25c7e86d4ddefdeec033ecb3da18bc7e17c7a4f67e5bcc1a81
SHA5127632b5bae8466d07799a2aecb58346ba4b61b48456a1dd4c7769c07f00516f96f865fb2d0bbee86ddde5f9b050a3c4369c1e7499d5e329c5bbef09bb85a42348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ea0356f0f9015bda38db3b5056f29fa
SHA1e56639968d29fdd4e4b47d72f999807c5949e8b0
SHA256efd757c89566d19641b80520509568e18bc7f3be29a07e9d8849e5212b2fa5e3
SHA5124c483600ca5d242cd3fb0fc6df2d3511ff07efc07462b4791a5b8092247ae082707f3d6c75f71a763055d3c9435db4351b7c0e585c5d9b87afd3f2ed845bc4f8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a