Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html
-
Size
142KB
-
MD5
2e593b7fab5388b36d4c07ea2a8ad4a5
-
SHA1
ea7f1fd65ddde26cc833ce48479b9f11df91d6e9
-
SHA256
73cb803e87b8d86b647a905726dd2a4c75e16a55238ab5f86045e40685279079
-
SHA512
110ddfb807a9e94a4109142072a40fc4ebd700b2d63ff1ba773ccb4961d3b069a59aca77d7d17540025b96fdcf7dfb6c860cdd63db9bd0ee054b82e6c34e4332
-
SSDEEP
3072:Ny9PTpnFZR0T8L0l22c2qGCH1hUzGwtILxmUqNbrZSi:Ny9PT5rO
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000004a5c7391251ec8b8ecfc489e04426ef90dd60972a5e79d48e5842bf761acc368000000000e8000000002000020000000222d0e42c4fab219529bd3895cb5e06c262de094b2330ef1bcb3a02c2ba6b50020000000f8b71e246d1007933f23b553420cac733ff5c97063ed78d7fd34c3e61bc7cfe540000000d38a5a18ccf753cec4963adb6ef7fbf11f7f5da0f43ba9981ee5d9cefbabee54a5bca43631548d3a0861273181de9bf36662d9ca602dda3e9a37d614210087bc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000097e4e7c8c85ea4e735c939f43c88fd6538ff1cee1ae4a4897081ec95a5c4f03a000000000e8000000002000020000000deb822158ed85bf2c39f30a81d81c4a0c45a822846c0bb08bb3b0869deb03667900000008409b942ce190808e0d7d33e52838992240c68a4c96ec2ccc8eb61f18d8b476c868bfcb26361c4256d43f0c2d9ba1ffc73d41d30dae364291de4afe803207b41ab7c3af9fdba8761c47923a0be5414a142cd6fda55b06ae5e8c442832d31649be9fae1aee98260f24e40ca83b0d2923c63f3c62afb6dc018ddd44d385cfccd894b45e01d9ec793cf2a363b5d081aea58400000006d6e2f96a381be26827aa7473ade5e6f90a1d5f806abc61ae12108ad1598732c4403a5dfc517661112f3e3ca5196be185813f17b2ec4a2649becac1d67a4b090 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D42D8C31-0EAB-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421493531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 307c84c4b8a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2428 iexplore.exe 2428 iexplore.exe 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE 1632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1632 2428 iexplore.exe 28 PID 2428 wrote to memory of 1632 2428 iexplore.exe 28 PID 2428 wrote to memory of 1632 2428 iexplore.exe 28 PID 2428 wrote to memory of 1632 2428 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e593b7fab5388b36d4c07ea2a8ad4a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5fca8af0dc8436b9952fdf961f8c7f401
SHA1ac194f887a84a4538985ece94daf59cea48fe65b
SHA256477645c7b83bbde8bdcf6d066f0de596d5b02fd47c223f89dde7d86903338cf9
SHA512ba0d8f654216d9530bec83aa011a3433cea27873be327ac60eb1244997995489db76e25077dead09fcd43009b05deda51fd37b30a33fff01c94ba3927e1c21d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5b9fe99707e1547279de7ec1d6d000
SHA11f92b664fdf26cedaf440526ec4ceffbed58e8d8
SHA256072888bca2dce225d91dafaf9b9465ce711ee11fec57e563ffa55137c7a8e4cf
SHA5127ae92c673934557329ac9831d4d27a9cf34c35306d3f850bf0a11d12f8798d3756c6d617ee66a8e849160891718b471d9bc0d2b180517f2d080c3182eaad2458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543de2ba17de92bb24f1209073bfd943b
SHA16a21468a95b9097f31aa69cbf5ab7b4430ddab02
SHA256d971e6233303b4297425d52f6ae2e013eda786b3ec8d50a014a9a53d4b3c0432
SHA512d77dcfa2c6e9313f9a24308e78280336a49ec4bff65200148ff970091611a0c80f8e338ab189c033a0a16f3aa076d170ca06e4d3c8409783e9e2ea256df98119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5746062c305940875d37812610273e21e
SHA1b5b794eee6a9529abaf89bf8217dfa977c616124
SHA2566ed11aea93a20e5820a6591ce56581e2c8bc6f9546d6ca00d44a1fb892afe725
SHA5124b57ac8c2029a8fe49e18433fb1be921916d690fb0a9bcc7feeb64e7dbdd8d59bee7dc0ae1a7fc0b445ae84b60723ed3ba102aaa8f419d712249f8ade16ac126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f924404f1d4dcebfa21385ff029b645
SHA16e265ecfeb1798704d1b8a5881efbe1f7f6aed9e
SHA256c1eb697ba3dad942c1c2eab49b3d9b82b14308cd7b42c3e64923f52cde202e6d
SHA512f68032a94aa988e11daa4d7a83e53a46f95fbdd1d455ab7f832c311e5a79cc6c5a5532b586991e201843a5da7645e72485f0cffdbdedb80f0a8b753f3d368eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3e33356a744839e422b25a13cf47056
SHA1e14ebdc09eb760c0ff1b27f3a80a0fe9c06b6bc7
SHA25692cfb24e0034a165fa90a73940b20ad45bb9b9c411cbd3264e2d33de8cec0235
SHA51224d056827445ad0dff615300fb56bb4c010839e142ac5f7ac12ad34fe4a33ae93728494f8bc4de46815a71073128c295663f9c448430bb8bca6f29a24eb0dd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aac236826cf8691519ed86f8cfece3e9
SHA1c5aeee98f7ecc0d76f9b2860c2f4335d301f298b
SHA256ffb2c4d9032356f2513507ebc325f67a8a5ea91e41f2ff562f9238072bdf0683
SHA51268e0f693e87586fe7531089311f6b8d8da6c8c7aaf7280f2e6f7f82aee16904b29c8e134903ff0b440de256527cd2481a30531c6cf0158ac751c8d8a27146d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0f0e000ffdc33220638e14449dff990
SHA1e95f779ba21ec498b101f7e7bad211535229d329
SHA256f285af3639fc1ea116cf082136442863368f599d1a9929a52b869bba4f71ac63
SHA51201dfcf91ef684d60f3ae1bc09045e988f7b54d0ee1a5ae13be9f510ff2ba528cd47fcb01ecfda5a629de307d77542b5c48a28f7da595b9e748cfa582634eaa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59639fae15e19ab0e6f4cc92a75b2cd64
SHA19c4204588158b210e5439b871fbbf2a5767bf20f
SHA256d989a271a1592a817ffbf8703f3654c9348434464106f83c744d95179f7478a0
SHA51254064e9ac5f162b4dc8636e2209546c7054fad920ac86b4448f008f132c1ccd90eb37cd1f62cd7b08929f249f6ed869bcadacee0b81ae7e3113e5cd219baa1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0276a0a18af0008f294fca393fa9ee9
SHA1cda4388865e7fe6537950a97047007eff6d91cdb
SHA25616ad238f395fa86a9094ebfded81fde28c76a3851e227a2ec9ed56e535e9b49c
SHA5124a3a817a36d30fb9af5ede04c145341a3c676c64971f2a295df1bd9e9beaba86dd90d1ff14eb6c20a9bba57264ee180e0b6592a4e9dc5367687dd6251eda4bfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d939757522ca0b8154eae9e5d66cc437
SHA1072b31880a38f75b2d16708241b10a9d20477f99
SHA256dbff931df0806cc20ac0f4a289ffb31ebddcb03951b0f9287be7017e2a574f96
SHA5127a9a3d6ef7670aef6579295e7475519a1d97837c83d323f8e28227846d9bc722e4269f5fa3d5ae77dccf0bfdcbb80d57e932ed0447bb7a11ef36cb06a229d41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffc6d9c21d0fc1dde52f33dae6eba98
SHA1a1ba581e00d109dd82194028d80094e53105d7dd
SHA25611bd99e342a7e378c15404ff38745c197177ded30a691910b5310b8ffc5ad293
SHA5122d102cb3df92401e1f8fb9b20d87ac2ff0f9ca241a0e4bf45d9bee5e4ce5eae655406baca915369557e2fcd3b06874414148a15fd778370fd322a3e94d3effc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c8ce5ae97bbe82436d21c6b64326e66
SHA15a579fdab8a880dc4cc5fb579f4145dde88fbba6
SHA2565e0ff90c75f45802429521b4e8cdb34b280328d242385fd4f426a5f2cc311b7b
SHA512c3325816a2890bb7f46ece97d258186a7706219c9f146394eb6367c0c4598d4d6290ca143e63cc30705c6d13eb6939f4907a71a94bca7427c3ab34b7da19d798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58105e4582c6d8385196645cce8509e76
SHA114afcced66a45a386586adebc5b27659645e7afb
SHA2561a8fcd2e52e56490cb2257015226dec0871837f8be3ee318caa9ae1446907db2
SHA512a64ca12c2d18a06f67624f9234fe50f0221e64ff9d1780d2a382b5fd7a374db3307b2da8bb4ec1789f5be4220293d02d65f76bf3c457a5d59db32ba07ce75311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0b07e706fab49d9999360d57995304c
SHA19f7007587749d53517d1806c2f8019b2a8269d0d
SHA25631d04fdd933dfb37cc41e9d8b2d67dc20639283bc2530a71f1ae1068894b52d4
SHA512f650ea52e504ebb641440122772c2a07e285b9cab0bcc8d034b5e2f8679a17eefb87a2727f721ef6b29ed30eba169f97432d3f439be7ba1e205f826a68124c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2809c63d54fe35ce18b897ada94dda
SHA133ca515167e1ebef4294b62293ab95f73dcf2da4
SHA2562f7e8aa8db56ea8e9db5ac69fc84fdb002bb8e391cfff97232ef65eba2bf9914
SHA51284559056b0d018e65558b539cbc121517d56fdea6b717900c3b3e3d375e1d50c67e3c4835fb9450f5161098eaae4c9ccf2db90406c3834531364971fd1efdcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ea68bd87a4c0cc2fdb7ec68c995dc1e
SHA1747809bc06a0767016401f2b64b8a36738464174
SHA256c76d9b51eae826b703d4c8bea750a40395dbb01c6a8ea772158e0d7fe7f7e177
SHA512971ed9d641f1fcc4a179fc6bed3a94faf877d6feb1f473c914505cd45bb133bcdc997e3017d017f2f486153424e724235690747efe360f91d5be2c1113b15e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc91f2e150940bb91921646de3d26e46
SHA1db72373d6a3edbefb3c3dcbcd017a79b6dfcd872
SHA256a6aff669a11724fac1f779ed52c2756d1b3906990aa4c3333865c0324545d659
SHA5129e32b90e081d49c80965dd5a33a18e7bc649017d708f2d012e0de0b8ac926be98516e08f4739c85d92a5e4d45fff69d6b0de3df35a785982c9c849afc2f5c393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541813f27c9064eea57c545cb239c197e
SHA1099ca12d0cc35a21bf1764beffcee71fa91d5b9d
SHA256dfad151741a444e17531cc1379ff284b08bd25e3a7903b5070c97aa001c15af9
SHA512892a8fa672feb7e356f7c1b58ba13b3edf8cdd301cd0c54d22ff32cf3d3238dfbfae2e607a2c1bc866116d7159b9ca90e3dd8b8f7bc945524fb475ebf3a363af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6d183fddd4cfc79a09549b44b3d4d6e
SHA172e3f39ff88b4e511316b78a443f717407732dea
SHA256036bebeda56bffa8fbbaccde629b253277276231251ac301272432366eb96be6
SHA512906ba713fc57910e66d8f8f2b068e61052fe4540f006d533dd497c5aac30837028e9cbebf58ab5fbd60cba0132fcd62175a91fca0fbcceff74fc5c5d0de8c3cb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a