Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
76c3f0ee8b9c4445c4caf72254d23894_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
76c3f0ee8b9c4445c4caf72254d23894_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
76c3f0ee8b9c4445c4caf72254d23894_JaffaCakes118.html
-
Size
461KB
-
MD5
76c3f0ee8b9c4445c4caf72254d23894
-
SHA1
df141884c503570f6f702606f2308cba28dd0b0c
-
SHA256
7b4ca75e41c34ed09a2875ae392780bf27641aeb404099351b1d3f65ea80d7af
-
SHA512
f7995def80fa80b81a7611019774818ae5a48b26df72fa60ceba20901e803e98f2394cc7888ea5a077bd95a087134fc8b3800491f5c01bc5739a5ea32044996b
-
SSDEEP
6144:SYsMYod+X3oI+Y9sMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:75d+X3n5d+X365d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0346b3dadafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64E86D71-1BA0-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422917984" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009e879a995ae1d44c9b589573854d47ed00000000020000000000106600000001000020000000ab765b179fc42b8a7b0e03c6f5b3e6089a5eb061b3954f5345f389736af51a35000000000e800000000200002000000089802152353f6696a6322c622c36161fbc72c587cece89902585c0e05a1d630520000000a8cc09596372dfc63bf5ff9e5b4d203894dfcbaacf3be771cced1ef1dbb0728d40000000fc160e87a118ab3ff28f8448d03a42f06602fd7eca01320c7cf6705a3da0b2031d0a8d774ae692c4ef1abdc5e269b1f43245999befeacc444bfdefeb4981a23c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009e879a995ae1d44c9b589573854d47ed0000000002000000000010660000000100002000000000440946bc07ef3c37ef61f4afb5a3d1677e1d7e80804e5bbddf571843fa6f37000000000e8000000002000020000000a9b687683b3078457e8e1e902b4eb85721ea343f8943e5fc78fdc359c618e9e69000000005ab97f881b7afc868122b6fe1d980c211176b4f2aad2554a9a56eff65206379fcf386f234334022bb862b0601f47254eaa552b85161ceac6630a7c36a5e12d1c663a286ed6dcc65740bd69ff4c7118e6830d856af09cccdee6ff0f3a87e6b49e934952f7b9e9ff0f0e0cb87e88c8594c45c3ad6df62374466e5096db4da47f6b4fa467e16ed75eed77ddb0c6a331fa140000000e2d7f9fa771f64e0151d1ca0e86a2cb30aef9028419f4fdfb8c335a59a3ab8fb03cdf52093ba14a962f7ccca508cec7a5bfc81650ba0dba582bb2bbd70fb58c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2920 2948 iexplore.exe 28 PID 2948 wrote to memory of 2920 2948 iexplore.exe 28 PID 2948 wrote to memory of 2920 2948 iexplore.exe 28 PID 2948 wrote to memory of 2920 2948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76c3f0ee8b9c4445c4caf72254d23894_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7757dc9509fb67f897c76a88fb50278
SHA110ba938c0cc17eadab922ecaabcc86624751706e
SHA25621a65f46281c6acb67d4b42db849efb692dafa5fb30b18f16fae514248c14289
SHA512a30993bc28bc45233628cb7ab3b0ce9695fe0fbe50db24d6396df09f1abea7eae8f5f677bacdb1e9f35b30e7bf5f32c1557bcac4f996b2d95e06cc6312ce7986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568d070af0efc7f435a4d16f7f47d009e
SHA1e586797d3f9bfa42f1b5160b595d36c2f2d2fef2
SHA256d50c504c25f7194205d1e2ea11636626d693d03921a71944505eeeb543d39f0d
SHA5121e77dbd55d0d2126d4c20adaefca03b318167c15b2eae99f610507357f2b31a9c3582532374276f1fbff47e1624e6d2b8576eb5a8287ed876f272a6ff1e60872
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae255a7aa7d267b5a9e2699219b8df81
SHA1790310c295091e2c975febb473e6c5ff4f890f01
SHA256cbc63015dfe94e05970ab2bebf80051147ed51c28b6af070ba49cfc4fd159d6d
SHA512276b67f3d2a28fd4d3e60f1776cb26d9643b4543089e6f488ac4c8f9bda416374663654c96561ca0f47fa7a8ea40e0d0e26d4abf5bec7e57384f0e6c81679623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5849f58311ad0e305d3e32d864307d4d4
SHA175a629fed3e5e04da19f4c60fc8cfbf48bced427
SHA256b97df2f60aeba5e925eaa54b71389df8e763b4464563840fdca10fa505fdb19d
SHA512df7300a15074bfa113b623c199c2c7770478b265e967a51908b307428c68abc9094c0e4fd5036b881a624feb2fa91c387c9cafc6420e38699ba78f8114ac1035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a073e911b2430a9d714946cb03c0a0
SHA109fdb4fdc9da8b55d759524863e8c09644e16c9d
SHA2568e1c8a3fa829a1381c33b8009c30966585386b82c335b35bf9bb166e30602468
SHA512cd1788c5a4a363f9fd35864065ddd07bdcdd0722e86b200175882a00f75d7199c0d027bc008951cdc6eb169925ce44861da0b9e3db843a5442d0644ed47e2388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc66066586d6d9fd8fabfeef06288e53
SHA1264519608c970a1d519e926369ad4905360fe6b9
SHA256ddb678fb6e97be6cd3138d21ee3bd22e230d359f11537ac7d4c44316425d509c
SHA512a9cfa16b04eb977e5b1f09d70667f9756a8b6fb1827821ca19f0859db990bf4cc44f8aa51072fdd2a8828e4d73c4f346f5414dc9126273605874f4ddeec1180c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd5cb69494c4fe79dcba2677253db9c0
SHA11d07cc20f4c8d13ec34a120ec4c4a665f01d818c
SHA256b7d6a5081552ffd1cf020e0748eca462c0b9caf4eef168dec7b5c6e5268b83fc
SHA512eacfe7b27914bde1b9a472fbd0cd34f38eb6ec0a209d0bbc4ff3892b04262efcaa6f781b340f03196d39c3b3ca8992058992ae24a39d65f9eaca28775af36c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559325b9854581735bb11d816b6fd259a
SHA162ccef0f83138f2e81894241f3ade48f729f2d0e
SHA2567ea1efa694a21f4652b4d35224d11f77d0d4488777872cce59a9dc45908ad7b3
SHA512898c185b2d3bd875112188a3ac344a93969c228ad395473f891d42463bd816e2e6073625ada8d8ff7fc6295e62d3a9d0a1fd23c57d1b9bdbdf9955a94d6d344e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5364e41520a0e0bdef36d7cb1c8611af0
SHA1d06b029ba84898f0f5a9e76a26780421f47e8685
SHA256dcde77ac6915bf9ef3735fb67c52ec02d2232d5789ac7f1d6403971785222861
SHA5122a6a7bb494befce0157dcdfe2018b235275007888ed9562aaccbac3b3fce4f40f63bd9f897e24b1e85961f53a0ff791fa948cfd7216ddb241841627e31e499fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab84694d45b2bec599b4e070ab351464
SHA1c3dde54b36b1a25419d8ce2ad3140f37f08097a5
SHA2564556871b4344da24bdab90830af4c31443fabc5963e6843f3c2c5652a9055e21
SHA5122b5fa0ccc43366205f50861c6af98987f78ec90d7c4f236ba219ffe88abd605de22048905f227929b246946c958d5f41246bfd5e282937226f89a1bd626cac48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d76d38853323d4b98a897eee027c6ae
SHA110835e667297f9f61a22a0e9fa028529644f0c7b
SHA25687fdb4c5300cc36d92cdc5a37b1b094e5ed01a659c19a2280fa58a5f4cf2d85b
SHA51270040675be5f9cebcbfd44b4d481897075a6d971196bb1dd3ff44332029bb37bd68cad4eca80f62067f44c7eece3dc6567742409bcece92ebe9df6edfd48c2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5774d9ca2f4b5eacaf676a1784aa503e3
SHA1a7361ece5247f1e4c66967a0a995fdc3df2ff1d8
SHA256d2926bb8c8b859dff942a2ed20644f51faa41121a83f752f4086e7feeb037e04
SHA5129b2399eaef7046fb101d58b8bdaab13a1361afc7fa69dbd821872da9eda5be6b19123e431108ef5ec2be034f214db89246051087c7e912e2c81b730227f2ba02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739c98da84a12368b42f2673b314d1cb
SHA1f8c69ebeb498056b834c67cd517c91b43fa70cfa
SHA2560d6cc79c803d9fa3fa724bc1c282a5423da0cdf7569ae4f3154799e929a5ef7a
SHA512f8804a5e5f8ee6883b7645f2186b45a6c776a7914131e8c54fb6eb3f04ef5a9f24faa6409507d16379311687e727a62ac4ab4f75e759096f5d80b308c6202f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f4a574e872a958e99de4c623fa77fc
SHA17e01452d16f319432a025e5c0ec932a09b2f941a
SHA2568fc8ad6b6d68a99ab136112a0976775fb897c0da675da19b57ba0193a615d8a4
SHA5129b2b7515bd84a860be2ef9574403002386c2b78a2863f3e6ff18dc0c06934cc40f28134a63ec3d20a265204a36fa58b4c990ad6e20fd18ade342cbe287b1b673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58440ccfadfb420c12348dbb70cb73293
SHA18eb7b33a888944883a8cd7d152ba4f3eea7f68bb
SHA256ca9427fbeb9354c4d58ae2401382b4d78872ea21ae76b0ff8102bc91cf0d7636
SHA5120c859e58478f025457f05513e2fb582eda5846e566242b1b970203760d29d2190edab51c31a307d20f285d8a27026e8b197c57b19f8f06e2931f05f1f83def62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522f5244fc98f2e70f696ecddc75165a2
SHA13eeecc9fbdda2e6658e6f77625620c41145d1b24
SHA256e76d4a24421094c8db2b2ad7d96758acf2adcc0726ac15c8d7b3033bf6ebc641
SHA5128455c15e72dbe472959b6931a8a2aaa2657bfb362232000f6b30675fa445a6ceaf270246963e6ca531aba227fae181b69d50e541b7d6cfec5c38e3a81a3b745d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519a9291629b99026199d210cc2b23f2f
SHA1d360561ad82a4b92a15f0eb81d2f2a1660f6cb2e
SHA256f608d07df51f902fa536fe7d9c685f50a973f8234127fe95707ee146aefa0a20
SHA5120a0abba3fc9619e17672637743ab7f5006f5aa2ca89ad297b878691850200f98ef4c9caf9736bf1a4a42f24f52c50a9dc54433e81909b9de95f3c358b4e98d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ac41df8c166088a8c70cc21b531b81
SHA1e7ba2aea15e96d56685538cf75d5f5f19738246a
SHA2562f4d239575a18e6e8d7f8c00537e49da7f06ffa61a0fc900e4bbddd24c894656
SHA5126e0c70e597c7d0da3eaea84abaf0a5c4142be304ed6a6164c319945f95136d8d54380e629ad15de2195a3e26e127e1a84ff00b38ae9d493804a2d98f4768f1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c76e1b86f9b0756fbfe8612f13b7f684
SHA1c4a70943431b3571fb022662eeec2d7150cef102
SHA25699e6aef74746441c55cf5bea98d46fc34a0af25c1659842e82c69f28a2792cc6
SHA512e423d285db5d8287ad2e9ceebd93f60e36ea744314b4d1f02dbc01fe706d465dce443e572cbe344c03ae3340b15b18f0e706a7c342a81bc30b403d9116ab6253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539db922eb640a2500f6704862bf76186
SHA159f9d8e97ad3542beedcb32231b05dc9bcd1de43
SHA25628a08df587aa742ff84205f3b3a4c074918cfafe7561d4b7b338042b2b09e3a3
SHA512b243e7902bb1b6fca378e5bbea5996523ec7cd514bd6c69a9974e8131b199d47267e59636f7f8c949cf06b5939294c1273298f6a2a7ba30e223e42249acde2ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a