Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
4d84d8596e1999de346a41976b935fe9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4d84d8596e1999de346a41976b935fe9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4d84d8596e1999de346a41976b935fe9_JaffaCakes118.html
-
Size
94KB
-
MD5
4d84d8596e1999de346a41976b935fe9
-
SHA1
a5356480808f1070bda088ace65badd329273bf0
-
SHA256
109e1743f03500d3b308084b124b08ee82c9e7a6001dd8d5771a1c829da551ed
-
SHA512
3823eedd96e2c3404dd2b2cea2d0c24a658da5c8d937e8089d0849c138621f46caaff5dd9b5cf617402167531004b61d773941697d4c8b8a73d0023c56ae1d37
-
SSDEEP
1536:WMLiNSI7LjZAe3sAifqFL6BrDjFQAfCdZty2bF8BdkrY8mgHC+qpEyW:WAiMG+BdkrY8mgHC+qpEyW
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422063460" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f74bf4015e27c75c9613ef53ca6c81066f34820696d7106848885942b79f2454000000000e800000000200002000000054be5074a1f25bd242b89bc5d0398c25d4e933dc7fc42f8a706b8025400b6efe90000000cac769099bcfa20bd1e508e3cf1939165195256178d37ad0cf32d07aad35d688a564b7ad8a248dcc934120287604cc841c1654db51f7a316749b2d66caf0d7d6c33c7571d6d0cc94f96240771cb80592c0f2055348262f5ce1094f0b1c916ae855d079ad335b92d893768509e7b2e1e8adbd8dae71f58801c92d707dd6be2414d38e4d21cdedff92c472018cfd993b5c400000000c245738f05618049f87bf964ed9e33a08d2500cf8cd565a1a153a85527683820b0d7bbc9e914c9a39ab71b2159bdeec3eda5c07f520da3f540497e609b59dec iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000007874add90161627af42aadc18898d6771227f0feb35734125b9eac7ce72a2783000000000e8000000002000020000000b943110f030030871baeac7ce76e8031bbb9155d04e8fdb948c0505b8dcb531a2000000057bf49e5a037095c0fce6f6eee13c690f59959ba33636109159c9e6319e8952c40000000b8bff0c01c4bd13d427806a0d7999f78595fc745098f5e9822a246a4f27d71975a1fa068a4fc8cc37a996854bfb0f0319f1097e34f0ea16f5d660e879439e420 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 902bada3e7a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC4CB481-13DA-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE 2908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29 PID 1728 wrote to memory of 2908 1728 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d84d8596e1999de346a41976b935fe9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c911654bbe4b8ee7fed9800bb213b51c
SHA1e24d8893ba233527ebbd897456cb8a73dd5439a8
SHA256d9930d69141a9a31c02fcf5d0a772fcaf47a6359ab6741dfc37335b0a0c2aa98
SHA512e7edb24a55ac8ebda491d0b6c8b853ee50ce0fc1c6375b8da715083040a85f20f61cffd12268cbb7c313695c2f1b4e8aaeca7e2aff8c944f053f87a8ea6a1c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5766def28bcc95b1bd91d9cd6d61accb3
SHA1ec1188284dab7da61d5ffa02ec07e724c785198e
SHA2563882b963394c01da9142cde9a3011949b0dc42bf8888ffa71dc3e2c897505f90
SHA5121df3abd02371854f14602e280c7865e6e05d8f3593fda86b1fbf4b991c3a81c36c2c7f319e23fe0df1d8b928e82d425f9f38c116fed2a434325e08701cd1f485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a95bcea40793aa0c0d2acb7526518ea1
SHA1e406014dc121967d2b61c823a1dad7a1fdc23a44
SHA256720940b912b3f4424d170150d72a86f9fff129cce3667755505597d3a2db8ed9
SHA512d182c3286c5b8d1895125a8c269e0fffbd728fd20077da9b69ae9b92dd61e3a456d94f79ac4274d876d399329c40991d84413f168ccb36000390b545ba4edf03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b763b3b823a3605a8e6915c5ab9383a
SHA18fe742c786227770832b2101eefed0ea486854ae
SHA256795088dcf290cfe9c21ae6be45ce50c3f8f1687f67b45169dc44be7b087e6ca1
SHA51210166b96a6fbf73c3a57ad21e323db76f068a91ded32b0d0407cfa9c5cf330042145344a1f2ef2a579e9aed7f9debd262eff2f8ff3c0353a8ea0c23b7555da8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5201718ef749aa28a1aeb1e0e6b125f71
SHA13e00d62acae7d166c304430f69b58801d564c334
SHA2562ae86b371fa32fac2b7586b4cca4b17a7fe9be462925759e0cfa598f5717dd4f
SHA51245f4e219c44234f9b326e5c547caebae6617a82cc73d3259be88910e196102cbd3a180d9b57b64c453f3d436a8ab3e8a02df2c1e194277597e181f88d3ef702c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556e2073bd6517cf576ba254180b6aa92
SHA15987c6375bcd83f6bf8184ab85f18259146297c7
SHA25693de3a6af21d765b6c04bbe2d776d2493f64237e4f387d260b5104bdb1e2fac3
SHA5127943de485ffadbdf8a337b7d3ea0a912bdc0d4177bbbc66b8aef38d4b65c738db25efef1c22698476f24ce44e47f9adfb490222b24f85037b62c75e265aaf013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d4422c9c93dc5e7bab91ef91ae3f7e9
SHA14ccc5f93df997ae01e43635b03bea6600ebd39f2
SHA2567e385da5747b19a234f2ab1461c8fbda4fcf8a0178998c840186a3f9893c0131
SHA5127fffee1105f99320b2d0b8d04251cfd281f7a7887c82343e78f27bdb64ef2909bd1a7fea4e88a88b4e3b3bae9c7aaa8f5d129374480b0c508487ebf5c8e0f317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff47d60d9f10fa7f7f224fbfffb6f0c4
SHA1ac95d7f25f3585f72b4b1797a41ce839b376129e
SHA2566b99e00c4896c124db4e1fef81a07c3a6985774b7b0ecf8dafd21db1825bec89
SHA512c986a69db9c680366822974c204351cebae83eb68bad488848245d83281772d5aaf2da5e1e1b4a1c1d4b9b78595b31ee4e2fe0bac6ee7284093907f9b085d9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576b451c23e9854eac40abe53a64f09f2
SHA185cc2cb2eb2103c26607ab65688799777f71e4de
SHA256c647cf12605ca3a5056115f06fa60ac968bf7262cca2023c7ee0fb768562dc20
SHA512bdf4d09241f6b12b1c9d9a93c4b0163c994a7aaa741790a322fd1b5c7a43f8323b6a8ee5ffba52283d85fe1c024c4a33334950d854b69a8fdf620b7661663740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504a46bfad8835ba1338950c3f8391ec1
SHA1f0d19d6f39315cf547174d616a809b36865b68ca
SHA256f665428c190d82f8a66e1f21b07c4be8ea6b0f415b05aaa27aceaf7d536a42c5
SHA51248ccb9730901dcf8789da16f549b23077b9deb26e6658793ef64551aff35b4ea3980b6cf523614b6736f46cedc16a24b32941494fe01349266b23fb8c1ad4680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5642ac7a0d592b58818f206f15bcf3ae0
SHA1cd7e9a9946b1734d801b57a8f44a204c159b66fa
SHA256da78ef4168dda43971ed586028dbb1b161a67aa34b36cfd8f6fbefff5845bda9
SHA512a2d5f0666d149295e35f83853bbaf3be906583005f3f67f74255edc852428b76f93f0cd6e625750b7266737f68f1aaf592c2c194c2b878bca6c1c43a35918ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b21a254ba41fca8db0fc8ad783edcce
SHA13a49bbe0ab44ecb6786601836d3d1ae597b8c4be
SHA25645f3c75927a714ee29b4653208049257f65946bc02c96da5a22c9286c2154359
SHA5120796f8346de2b7f30e2242bcb9604a74105d3d887dbe9adbe8672dec0cfe2f3c4870ee2cfd1f33208fec4a7535b13df6e738ab6091fd5437835cb045fbb80489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b639a64463811ff045690fe8276eed7
SHA1fe43b52f05badca0b2382ed88ee58a379a742936
SHA25603fc6fe77013970ab404fb64cf49248d4130355e81e6bc65e24868cc1ea421a7
SHA512fc582b1a76d2c2b37b5778a232d4b0ca4a8a7132cd99fe0d9fcc0263e42b331337fb4f2d4338f68fca17ebead7a3dd082058bd4cb0ff5845948471461bbbeafd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dc9b2719f236b09057eed9762e19681
SHA1973a07446de0a43cbf941cf5a78b18c899f0468c
SHA2569ae59d6ff802237867e9ff83df60f97e0ac10137dabac73d74b338d373551aa7
SHA51292a12b6c4312effb0119c481127ce93a39e3cb1094d7a1bb84898e64e5706d7865e7832e4546a82ec46957241890ba3d00b94d15388155d222f6f3fc53c6ce0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55744fbe0131bd0d90119a3e181212801
SHA148eadc0c4cf15c2a1f49ffad86aa2c9f47114b17
SHA2569219adcf1ccf81b618a94ed76d2c5be73800901ab981fbe2bc06ee7211171215
SHA5122e0cfc46800e3d39dfcdbe8d009f510955adc0c70fd5da2d42f53b6d8c976bdc16163882141c2dc7cf16a88fb7443038d08c33a1b90100e95e4a1b87a4538abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f006686b239659402462fce34b2d320
SHA14270e6a44163570fbf7b35ba9754fe317f9298d0
SHA25621264f1d806a612873583d7bae6d35e10048746e4f435e7d226b39870b9f5ce9
SHA512cde7999b0be4162a1ecef229ccc314f557a02120f9ece1e201e691244a2c2bc0889ba1e698acb653646ebb41ae386c132580be97194dfbe8dd69ea01a5fe1474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3376b6f4b137dcff04275597004b086
SHA1ebbf58543820cada77899d388131c8e26f2979d7
SHA256c47ba70dd459b7bfbbe9e64908962cbfd23357dedb4c273b4f4d7913e99f9c90
SHA5128e7c2f955ce89ed65ea844919ddadf6336b3911cde0ee3b3621f3558de64ce07a68b54343b5cd0004258764495f96c4bd1fefe3b7b0f956ae60564f7d29e6d7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e678c691636228e6f7a4f4776699425
SHA19528cc05d756ab926256db6834cfcb1d411e721f
SHA2562b4cdc1e4d6a2304d3cb07659848228e2e9ec1841e70aa982be0582a50121ea6
SHA512f131a328ee02ee3e09c69140959a4e551b5da6fb137ae40a64dcec3c54d966c780f139a7d6589ffa9de2a4da63d3554829e4370dc23f6028cf46d24b503eab4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a2a39ba9d14491646c8aaab423b6096
SHA15c1ceb0846cb093ca8d44f6176af43bd0d060b23
SHA256f78647a2a0c4d39472994234570baf2606cc240852a0098a49168cf638827201
SHA512e19877cd0d064f17452a76dbc0b38d2850732462838be31ed9006a1cd86296ffe6dca61db8dbc8a2c755ead93802c577362417a8ed02abd83d0a72b5b52267cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\styles[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a