Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
33ac63c8267e1457dd54306cc717559c_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
33ac63c8267e1457dd54306cc717559c_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
33ac63c8267e1457dd54306cc717559c_JaffaCakes118.html
-
Size
17KB
-
MD5
33ac63c8267e1457dd54306cc717559c
-
SHA1
2f716e1dbc4cecdd00b8a769bd4f98c3c0935885
-
SHA256
2d7c48c8973dc781de44d022b4ddb2dab6482f720e034f051dc3b1ae496e7c95
-
SHA512
e2783b11c0e7ae8e4a7b42538c9075067408794959d8ebd61460007ca51e3b4d60944e69103f96d1bdac959f1d3b1b13c2e99040909ecf8c42161913f73e7440
-
SSDEEP
384:8vp3OdFSHuDq1oBU1Fa93PpueeeCtjvjFbA+tLElLDzIszf:OedFSHn1gI4hUeeeCtj+LDzIC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000567bd0059750af70a7b4e8d740356fa216782ce8b93576f45ac284d930fd337a000000000e80000000020000200000000bdcc0423f14c8020e52a78ad525bc979e2aa872951280ce929369cabd0505a590000000b2672bde380b1c382a5e53b8bcbb5eff354463d9f694840dad2ad75994cb84caadc4d9606112c26febf194e6d47a577bc444b3878d36a68b105d46c60ec099892aa30595fc817fffc20b29f9760856f84ae9e50bb8bbab3b71b852901abb80137aafb97fe641dec7d3360cb73e92b0a505e0561c3dc63ed250ebe7c9c534217db124908a7e774df9e3e4fd2ab9527dac400000007f2d4363fb95a26ab13b2f6b840363bf3e303f34f8170cc33ecf0292c0459ea66b944a6087f076747e69e0c3c72da0d87ccc019c999eec69de8dd4333dca0a4f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04db2257ea3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44EB9691-0F71-11EF-AB95-422D877631E1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421578330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000d46458021727c59972ae86bad55f26dcf4a30e198317a2e2c5765e1cf64ded0e000000000e8000000002000020000000e8480faee74c17807b5900e74e63c2bd5fd25d7e414c77b4f2a5c6c40c93e55620000000591abc45025c324186e452c6708ca82f08b9cadb2f0b9d9c46f61dbe57a128774000000001e8de6c7aece241f2bfed313232a9a5d3ac77545e162a01f29d9826e5847a44710edae59acb740159ac19a4c12fdabc0dee2831a16ac391162577911357a352 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28 PID 2188 wrote to memory of 3024 2188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33ac63c8267e1457dd54306cc717559c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6bb52fab033f193c23d66f281e8ca8a
SHA117152f1c5e26e8a963fcc3ef86c7e7ff3c509b61
SHA256c757937488f5ee4aaba5c7530d9ca91f240758802c7d5c997928cdff4e175004
SHA512c3a69b7e5b78ecc038bf5c6cd2a82bc872b40a9ec3a3f6ec5bbf7f334b83c9b9a72f1b5e74df7eb92e105fc841338d3a32c1158a7afa66b486422e09c7d7d0cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50086e616d5c7a0b983dcced1ce8d8da2
SHA1543be995189b559bb9e9425812335d320b3924d5
SHA25602a9a18c93da111f5af335b19d4c0ab8247b4d7ba5343418d3a3f4e2f4a5708a
SHA512b202863fd71df85e7c5dbc8fa2f8396deeb93de3dcfb32f20f84982251ff8e516ef6aada96c1e7f88eebb09293040d2b400e6004d70505330dbfd5ce3f332fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb08a09198f79a40d36b7c72b31f68f1
SHA1b0f34b8433524949494950195da543ba3f5bbdb2
SHA256f0838c5f676f30cff15a7798e8c02913c1cab74e77a07b883686a1e396fbf438
SHA51231dbbfdd670259ca6f39e88599abd307c318032fe9a2882f5a8dc5d8c4917e6fb2a6a5601b45acea7224e8081458e6256415a78439cc3a7399ad8155564591b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae55630c8c2015b02249ddc2c955e7c
SHA105f893203bfe04f0855dea224ec6e4c380c6ec81
SHA2562118750285858d9259dc5374647a4e92d56a4cb15e81ddfc7a2b1cb484f5e534
SHA512d3ca8305c7d9f5c4c9f9e3b998e0ffc1b24620205e5c72d1ddf9acf585dc95a66d5a86dc7c1354f819c06da018032600b6d88e9bd99d0fc92b39d5d681249926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578d1bcff7effd276919a1e25114a3302
SHA11299f3bb4cd13bb21b4300ca742a0f4d7ae79108
SHA2565034d0ea03c6c5c62dffe0b17142d7f1a1b36015a5c30fce7a688d12ee4130f1
SHA5126ed8e1aa814bfd08658b4e7c2f7e65cd7dd674b5cf292d31740e793883704713bd0d7b5dec4f5f839f72b0067e5f63419e983b1602a3448ce7618a310d2b4466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dcf471b825b6b71f1833e2e7e1ef374
SHA1fbf58e1a9261da9dcdde413deb8ccbc51eb4b406
SHA256fc8125293d3ddd14568347ecb08cffd798976a582e87487e9bd99cc689b368cb
SHA512f2b7f433ab7af342e7b0a37648f40482a1464bf0eddb2bcbdd1aec75a9a5146d9f4f560aadc96c6ef81951765dc2c712c61f092da506c13be1dde9e3883089f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5786e9f3d5d9a4957ede40f3dd54a9eed
SHA1e6c58b62aee0eab62052e226dc0e8d03aedc9ff4
SHA25679b076e6d7581f2545d2679e60e9e10af0ea9c848cc83bc6f4f4ba19f7310580
SHA51263ec711c964390737f68e001f261fd72537cb57c8d0bbc6bdbaa34c68fe8d01fe82732865a6ebde303428ac9f0d96353b2bc85d361b1dd4b03b13ce4993c4df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54192157efe43181c2578b9a0411a0c2e
SHA1fe512301af4461b1682d326d6a515b490b6cbcde
SHA2567d0ad74f676c2640c1ed19f2abbdb3f7e0597463f58c32661fb4ecccc7550d31
SHA512f1d7a4e024e7169be90db3544aa0ab4a676a982a7fd3e0d445c88e3f3236f5098ecab63c32d135fddbd6d31203dd62c65f4900ae76e6509bcfb41489687dee12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520c7742fd4651b449afbd1b0cd340a87
SHA13b94d656f123449addfe17f3120b4552fac2cfa0
SHA256f31eb4050b8f09f4e7b25fd3cd374189c982fc63108e16e9705c748c03bba7a7
SHA512f62b3d06967c2bc2fc8356f7edc6f0911802ba6b31e56a24d021c3cadf57fcfb2a10a65de5a878e408421b6832b07bafcbc01849f405b0c1da3af36e7f007242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf7004265e8b134f8631eb8f00932c8d
SHA1c969e69d0b8a1eba40b6a6871e234826e8f1e4b2
SHA256f739f1914ea95aa1cc19ae669d17968348f0338e68282fbc4d5e0171a541eae3
SHA5125b2d1e2e16022d6188f30bfa0ec8c69acb7edc3a23970e2c7e496af9ecbdda8b87329a6588aefcf20a6741d4151ebb151de1d1efd29a3dec0aecbe2c07fcdfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e8bd66594fdc9fcb2e43bac5e587f2
SHA1c33335040f11dc04202d1ba347571ee803240a2c
SHA25658cccee4b111b58106651d94439de45d4bd3cf257b80fa08074d25ce391f04df
SHA5125f7ed707fa8423f389b24a6bed8f700963dd6df620e7680e380340f8c190cd14266ea834e29079d6fc85188ea2005fcc16c127c642f98c55b9ef7c59257be291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b7321062758acb14a613f8af7050c93
SHA1357a27b44acd0bf33e83976158607aeaf7b1348c
SHA256283ab22f64ecfc718f8e59b9928a33d1ee79ae1b984f1caba67d8b8fcdc87086
SHA512f84a2c404e37fedc9e4d26e57c0ec7348f1c7a30d93182ad3065b442f716f4d36d924e51bce3096a037799178d2399de8e8cbfb43e27255a681cf1c87c474134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a24d881754febd62081a25750c1682c
SHA169d0be9e60625e0bf4f5a827e706eb6626f81815
SHA256758ff97f236934e853ed4ae2dd047d6d89bead21f6e82859e984ea8340c37fa1
SHA512c27d1f8133a01f2727f8da5ee8b1eb7303b34e05371d8dafd68c5bba7b63df1247cb4a4a3b5e7855aae7a98bf320f46146e9bcaefe53950b7fb1833ffe81d64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f105d29f5be4500e70d42217747699
SHA1880af315f46a94ddec3b0213c489f1c5e9f62b39
SHA256c50f8f59d583fb50bd93db14f5d0cd042ac4ab4efc7b6964b01f15b6fe151517
SHA51209c2b4b40456c1a5cbab4c5ca32c2999fcaf6a20a688ccea715cb223521c275a17b8a279f6d6a263b3102a0772ba3db86f77165e29b6653ae294c1662516e9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc20cc755fe0f8666e2eff2a0d44f351
SHA1165ebc5ca8a7629e074c6169a220f4ec29569825
SHA256da14ded59b369678219f7209785db4b0a6d20c8b6e47b404fa23ebb3f526e756
SHA51288ccef0b8f3e7d470cdd07f8d9eeb9b6915413df8d4457cae06d87680adae9d8c07407bb8fc5da2941ada9e8a2ae1c7d33a3ca9512b64c75f2b2d8db57164ed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d8ce6d838049d92936bf3742f31724c
SHA1d893a0c1e5ab0125ea93a12c8869371e87f3961c
SHA256bf068e720a973f560cf8e511957c9751fd3fb7892006ab93d06635d2d7263d37
SHA512c9b7ed9756acc6a9cbd83d070ac4e1b9d5e5ccbfe7c59b386b241093cee8312bfa0fef16a0414038350c0f82b92ded4e5d2420cb5ab8100eedd4cf5b5f98493c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da2060acbf14b336a5792547f5d63b1c
SHA1322e29f61527c48c76271704f3f459903ec3b169
SHA256a1afd147a2e3f21dc7ed5777745e4ac9747cbdd07261694a344ebee2468b994b
SHA512fdaa4a651120c6c1991e65cdc41c1586046ddf7a26bc6e0a8085110422b844a1b1f955805fa5d18c5cf934018bceb0382fadf434a85545f58c83a3c5e42a5245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ef77f50ac26c121e5e29a4f1931c73b
SHA1d6eae8ea438f6d311dbbffcd1fe1da218f7e7b0e
SHA25675c5b8259c367a2f3543d19bf6e9aae19b00838b39d4332bde39b1831646d23e
SHA512d7802170fb8733f55f83c5b2ff8f4239251dab28cc7569ad9ce79931561107bebb801fff68f7ab518f75a5af9c0d4423078d1b9dd05808e10f72ce8eda14cd8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0d068e68c5c0e6251765dbdb1d2e1bd
SHA1733578f3c31c4bd8e343df151cacb5d0ee36e34f
SHA256ba7cb965c6f9fd86a21f6202a3b1243398c428ddad82df0f6206456f6a394a2f
SHA5123c72c7cc20acf1dac75b01db25131220065b5274204cbb3b5d98ca34e84d5ec8801337dc500741d8393bc8cb0e9c8cbe7a688aed5765e7f43c0f994c189b731a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5183b275cac67391628f67e3588cee8ae
SHA13a27ec967cd4629a264807a8aa58385443f12105
SHA256c6246b0b91e63e491e0642202c7275690c606db0f15bb253a98f8df4302e7111
SHA512a9e4f4d200b4ff4387c53c6527652b1a63c9deecdc9dece892f60d3f28faa2774f7c71637f57d019335f943ef1845a49fc898eee7500fb179430be3573083aa9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PH7CXNA3\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a