Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
9a24650fd3e3b2b0806a2ff63aad97bc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9a24650fd3e3b2b0806a2ff63aad97bc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9a24650fd3e3b2b0806a2ff63aad97bc_JaffaCakes118.html
-
Size
461KB
-
MD5
9a24650fd3e3b2b0806a2ff63aad97bc
-
SHA1
47514f2d2e67db8a0d475937778c3be4d3057391
-
SHA256
0ac6958dbc4df214847b66913057b819f6542a137dc994e8ee886d9daa66355f
-
SHA512
aa6f90cf669ff3608d58bbdb2df41343e99f5f554aa2ffa58340f6736c166f5cf72b5f8d145dc669956eb3a9571c4cb9d2cac1556a746d53f88c4cab199ffd16
-
SSDEEP
6144:SgsMYod+X3oI+YzLTsMYod+X3oI+YrsMYod+X3oI+YLsMYod+X3oI+YQ:95d+X3BLn5d+X3x5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000326b88bc2ad552448ddfc023231790e600000000020000000000106600000001000020000000e92e135bd095ab5a0752c42735eb050fa873522fae181c69d095d09afd82017f000000000e80000000020000200000008b50551f68566aa862a3633cefbf840e397905a1e6f1283344f58c4d1b5588252000000049131a0f9bba480af3c106c780db22efd5da1c528b7033225aff4855f67f774840000000fde0519e302ba57afa3b4c1c0bd618c097f01a8c6a6f6bf0bc4e083363306d30005dbbdb945089c2e3485a1dfd919eac07c9d180312a693cf7bb667edfd80d8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423817109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000326b88bc2ad552448ddfc023231790e600000000020000000000106600000001000020000000e00c199b3c8e4c091fdbb66e43c0ab8a3651850926c770b2d8bc2ed87af03950000000000e80000000020000200000004e631cf8b43fe0d5d2386269449aaf961511638600836bcbf045a9e53b4eb95d9000000028793587898ee643a43532fb4cc44ee076bdbb936cb7100693912eea75ba28e703114e4646d414eab264442668d1df96ef27445098bfe908b679e4a64d5a7e716f1a6b144982da7eb433125fdd4f126f3f2979a26809f3a83555b7762a54c3a93e2c80630b3f6f4f0753015eb129b1e0d9beddd6276877279663bb026e1cc70c31d84282514967d43b636980b4c9c7cc40000000a961818b30d572248e8d93dfb78a2044d94960a6eb2096c420e2d988b72fe04736c7c74a66cbf348cb595a8785905b787281df180a43bbdfdb14c17646928666 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D48BB441-23CD-11EF-8E7B-D20227E6D795} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02e13addab7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2740 iexplore.exe 2740 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2112 2740 iexplore.exe 28 PID 2740 wrote to memory of 2112 2740 iexplore.exe 28 PID 2740 wrote to memory of 2112 2740 iexplore.exe 28 PID 2740 wrote to memory of 2112 2740 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9a24650fd3e3b2b0806a2ff63aad97bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08fc9ba4439d97d0a889a6ea7501637
SHA1d4dfc62a03998a441d239faca942a78e04ecd5f3
SHA2567c4ea5f56fc5728ace0d20997fe85b42dff430b22ee20e277651fa2ddd547f5c
SHA51233daa80d9a1a39a943753663d159d9c83f2a94e564c8d5c6f514d05211c6f7bc15fec849ae0f982c88e1d20b05981d95849a0b57574a39c71599598118d49d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ad04df9d659c810d56840942eb20ab
SHA1db95c031f18f4e187ca44132a6fbb02c138ac0f6
SHA25647ab19ad04bad4ee82653beb26950ffa3b300e59a16804d43c658153f1cd2222
SHA51215b6b10e704f86f5e906762d36aaf67783903107c5792ebfc7a3d0f43ff7d6fce14e24cb073388b8807db43412eb95a637105bb62f6fd1d0cd0ae763ca42eb66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52123d9a6ec02e99dab6cc220c6ef085d
SHA1779705f4277bc227fbdbd6804473646dbbd55134
SHA2566c344ca9a61f72adac37f71acaecffa5cf0f6eec3e6b5f267912e315ea6ba5d3
SHA5121c5f8abc3bb4e55f8c89fe01028b3fccd578ef80114b092b53a6371601c6f8c99f23b8262a36082fe14578cbaf4de2654e0b9eddbd13f62862d665b3c10c27d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a06a700df92f848df143ad6c3c10d68
SHA1482e53264813794845b1ec8208fc87eb92e18ec9
SHA256f755f5d4ed14aaa346061450ebd4f39b5829dba38cdde7515bdc3e5187ea8ada
SHA512855a0791d1a175bcf679b53903df6c6fb470b5a7f77a6930b3c2c42e378877389bf1ebf5dfc87514856e0f5d0f47f788352dbbb58e9cf3a6adb61c7bade81216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f45216b7b7589a119e3e2fa1aed40ca
SHA1a4e0fb0d826e253fb878c724b5e646a72e40d620
SHA2564c6bd1aed5e41d3a82a1300e60fa6b4cad12de8c6651aa5469936f40f5888f97
SHA512c69e3cf898b1219bdbcf92b0a69883d89c8f0932a0acc571ce7530c65303f9a0867f71a14500c0cbbf631c3a154af0edae86c76b30baecddaa3ed4acd125a73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90bcd7f053f08125cdb100bc8b215d3
SHA147b63d1a112a4abb85bfe44c3cb0dd5af59bc3bc
SHA256c8a66b15d5b1873f8985a79728870fad61c26bb128aba5aee1c2737191ed1d5c
SHA512981642917c1fa5c8f05c79f24035e74c94988f91b017294092181f86817aa9889ca3d790a4a639768a5a48bdad071e4437f3681dca3e26d22bb50f3a9c182450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527569faac31487d67c9384975e5b987
SHA14230e3fab60c2f7328e2c0da18ce6b26a9625753
SHA256defd279c048507b8b068b44d513f53dd152693f7601440b0736d76ff3c22c7ae
SHA5128f4f3fbd74635b50026d3863d09771ac4cce38b3b85c712ac94f8142c2554dac8a213f199f337970221e1c2382117fa746d974d3a3172d7f7f8e6781c678a264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc33659f41a436eb840cc75f69d380d
SHA11b7433ad57c2171c7efd929b373a1f5e042ac759
SHA256f950f8243e8fb96675ada071730a9e88a6dfb6ef6ffc2bff2395c798a87e7992
SHA512dcc174fdd572f0062c38b9f3c8a85237410d2743cd19b2b8f5dc21aba2a049b99740c072bda222700e1be3927a321dcd24518799acc1b9a43528d805430b279e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8d57a11726da83cc226f806811b9fd
SHA150dd5d4b0fc6bf8cb2b9ff437384c81d4b0556bd
SHA2569f9dfb0898f440963b536cd1e291192d227763657d744f8015879526b8dc3d6a
SHA5125e146133fccf37e1b5ad48bcd2311968946130310fd5ff70f2f1e985b252e06c9f4aeeab593d0a77d0dbae2e4dd32b95e76cb39c73c5dea2783ee3c4ad8dbc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fa05295c76ee5169c203296c020c3a
SHA19336dd6fab5efbcaef779889e3737d83f7defd94
SHA256548474ccadcaf572ed6818a0b481d340e25456d76f519ee8b390c185f8def9e1
SHA512b65fa5c795823ac81272a5a4d95c87e3664eed291bfe09fc1307efbf20caa1da7a0ec60c2d3facb797d7be40e41bc129ba26930c490a932ab01ad26631713f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d977fb59f9cf99ce62ab2cd8c9519c
SHA1b772273156e9e790334ecde090aeeb42955e3a04
SHA25676b3b806b8d809a4d2af6f37609cf0e30bbcfcdcc9c7b68ed10bbb903c722d0a
SHA5128da8a2aa86a7743030bc50a68a1a16081e500b7c4b045bb959334b85317c1c4baa74cfd4ef89510ba227b83dd6529e88fe78b8c72efdf72db3ea81fa98c052f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ddfaa9e5f892d384c47a75b8e481d34
SHA165315d517c7eb2e0418be97db4e8f21719b3cad9
SHA2560c4c9a8cb412d2c363d2430bbbd3f093d5bc56aee8b5a8a8cb7e1fd366d1967c
SHA5126a41f84264627ee9288189db6dc40dd0ce50c374d600754efe5d27a51c2ace062518f1d1b9fa29858405c947f64a98ba1ef072f127b0f8183ad71fb763813b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473cab89114e6a65535b7a025d1ce4ab
SHA116ccfe6dea190bc2c90afe65972029b6bf8a0548
SHA25623dba0951aebdfb5076b156cfc8e3ba3e218def9611a9d10296d9e699fad2ee8
SHA512f2c419c89551ca36720adc4740a4e82c63fbdabfe3178440fc89971550c6adf3924a0593e409961c97d08a9f824452288b3f9dfc374c5ff47ef077b5fb622bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274edc8cf5967abb5b96e7fb8c1b1ec9
SHA16e042ac8c557e663d91cf3cb740591964146aeb9
SHA256ef81e69a3344655685174b09757c5120cbd87595292847074f3665b22339cc8d
SHA512189f1dd30f22517ef25e6e8aeab53bb41359c0d06bef2ab5d3a54792f243cb15480a449ea9a8d50936449640871858d68b13f1eb21d9b7ca1d17d3f669405e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e10318fe5096d91cc69cf225eaab6e9
SHA112845b5d4394b18ac7a3b085df87bf531c1c59aa
SHA256d4ff38811f62794e220418187a73300e09853d60775ad57f3be0fb6f6a212ac4
SHA5129c93d84967b5c9028e4d796e00a0aa9549a78518c5bc2a3ab65791a9e43f4313e565227c1f02b9bc059f5ff766d80c9297f3ff6f408e7e65324df552721475b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585a1d86c89abb05fcc857b272a09ff82
SHA1862c5348976c6945ae8c4876955dfd7d69e0672c
SHA25672239cdd39074c0cd1276a2e0b46541a2572548cf82c4af8b1bd1b8c83912770
SHA51234e1fc6d94455866358643886169a1a5f15f5f4ff1070c493addce285059975b778e3e175afbab7e4c2af4d7af2cdc5f589278abc4180509a22646d38fa377c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb1d15fa89c644557cae49d01b587b8
SHA1164638042a18ef457cb58fd19462779977bf5f33
SHA2565640d0a50ee4f1d2b10e38f9c2f70e0a0c23c1733cc1e0195fb69586b7cf775a
SHA512bcf95d6ff8bdac80413715f6cfd8368708e16d61c35ada74a1dece9696b1ed2211368457f413d9857cac73400999d2b004e1f3f2e3457e36021302499d68faa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55930280850dc2a9964bad1442c3a011f
SHA1c70e9b17353fa05eec061e7900f5ad0494760c27
SHA2567fc83e34547f759b13ac3b75ec5aa721418709ec3d70ad5d2b773a41ba1510bf
SHA512c8977221092ee53be4d1a3eb025b5a5205f879af3501351e17404cee559ccc0456b5fedf6b09c5d8ff46b4158bfcaffe254b6830d330a7fd73de7e8dae7842d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccfb425472709682cdf9057535ee34bf
SHA136eaa8279703dafa0ac79929acd1e245c8e80168
SHA256a85ace8c105f2ec0cc4e82166078d21329a9250fb6f7e9a8d86ac439339a5e8d
SHA512d599e1f02962171f6860b084e670eb8d10753c513a9e59621b939a0520c883006450d32c7f655ccf1eda3a59ff3f0e4289135441ecb0972e512a004974c28340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c0611986fb65928ca001bd3611f3d2
SHA11f2c9c56d254dec4f7cfe1ed8bc57cc1f3f0584e
SHA2565e0ea966b4adb3a40cc8e36f9e08615008de2c1cbc9b7affbddb3ae020677bf8
SHA512a717fda7b0cde32f2a4d2ab4821d8b8b72569665e7c99abe0321824f5348c9d408007ee6932a979c88e7f0ac603d86c26db358ca090c75735ef4596c4a54b9a9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b