Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
664454373829e15e39e81eb855082e75_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
664454373829e15e39e81eb855082e75_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
664454373829e15e39e81eb855082e75_JaffaCakes118.html
-
Size
11KB
-
MD5
664454373829e15e39e81eb855082e75
-
SHA1
ce48fc3b7ad79d756c62f5e1db604a6ca4b3ab48
-
SHA256
8bebfe5131149fbe076c261133aa007747a0d781fc843d37687a1d7b19c8144c
-
SHA512
9379ead7e329d0eb23851a0d00c512432f185167f5523f3bed1101c4991508b4fc5f58e1b09a405b603ddeaddc63b7d705160a06d00b0840968680dadbb43ae9
-
SSDEEP
192:UJcqPtieLOTciZrieoK66BMC7pOs7A6TUXd6n4IeoETSsv:UJi/TNieoKHBMmpO2JnXQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000051859c7c10bb68070e686dec51e10f9120c332737bf4eaea2ec3c5107904d42c000000000e8000000002000020000000307bec0a2603cdc52518a8903b327bddbd7274e82e6ba65e0809adbb311e7a359000000055408e4bc2079b04509f1fa0286f47f2a4423ce4c82948c849a789f8c06cd52e764c5ccfab65cd59013195caa03fe7a23ae797a26bb5eaa70d63e6ced01ed9cdc0ad1476fa1a3ecc5709818f77d5a187708930e429f981107c5f9b9ea793118d4a7523d6cc974e036025875d44e1b74159f912f2a0e0dd097a1e481b2ec2f362ca56f798322f42c648822e119412a54540000000cabf740a19de7c615532a547553500281722c4b03854ebd012f8662bd786bafd2f744ee0d5d707c414dc1083c79ef8ce54e9aa8b9655f6be45c29544c797f99a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7D47A91-1801-11EF-AB01-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4043f4d70eacda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000009e39da3146ead175019142ec80dc8a7f5c7180971c384c3b2c862ada9eaab043000000000e80000000020000200000005c68fea82d13b7c7795685500812a393e2ae7b2315acfad3b97942ff9337c5492000000059025bcd10de7ac39cd0842357547185bda13d59a5e20c6f810874e31e85e518400000008b8d09d59b3cb854f0dbdf311fec4c29c39666e6b0291ebd086ccf95d2844e8e8dbbe5a59024cfa7ae510df76a03b64b551df95c42e4983622e34576e90e544f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422520087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1532 iexplore.exe 1532 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2704 1532 iexplore.exe 28 PID 1532 wrote to memory of 2704 1532 iexplore.exe 28 PID 1532 wrote to memory of 2704 1532 iexplore.exe 28 PID 1532 wrote to memory of 2704 1532 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\664454373829e15e39e81eb855082e75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1532 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c88766463693dc21e6f0eb018ae1aeeb
SHA147b028c8e7f7de72770a0311150c1960d434f9bb
SHA256639cd75a6f8614fca67496f8ffc3a04717bc26aa757ae055ea775ead4466fb1b
SHA512a8e216d5735c5d388a8384619e2e42502336f86347455c5d373a77d6f544a7173d718357ea23197450ccb7dd8c7af862962f8327eb7dc33fe497ff444a5ac715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85d99aca91b369fdf741b9d5352da2c
SHA1b2f7ab70db4c3d63779f02ad04314b7e1cc34bd3
SHA25613a08bb382cacf4d325e7293418e6081e81b59818a500eb555b76fb94c63cd44
SHA5123673da9dfe89c29fbbdf54b92ae14826c61d53bba3e34a83bc7e6debc5ea2a61503b8bc3e726fcfd70b82f35f56c32db2331dc3bcc839f090b7063d31e50104c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d43b557672cc187f0fdc8574d146290
SHA1ef82314ea157bda7508d54419f518d639ee7f1d5
SHA256abbfa362d4550bd778927c838571264a687302fc671f75d73177ccf9e2c7cade
SHA5121d460fbdedbd3230c3980ea13b37f5c8a507342bbe7275912f0f54254ab7b3b62c67487d4bcd394c4b6e289ef8373c8358b5defb8f154049d70e9f7853bf36be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56009f1212e30161fe70d2db5f1b3746d
SHA17fbdd5e15900f0a5e9bd13b40247979fe56aec49
SHA25618f5084ce9e7ed2c8e809e6e9a6c8ace56c7b1aa0d141cd4cb27428ccea1bc7c
SHA512268ddf0ee2b626f00fc93228400362b7b0fe52bdd55a05391e67c02816850788278042d0c1e92dab925f41d18fef7e0f95853202a5008358eb6a2b4d8c407c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c323123e0eceef03c9e031562d4283
SHA18bec7148821c520f71ee51b683e61edcc1440936
SHA256db7a10944aef28e48ae8642c28cbc7ec9411a08d3450c75422802dac2cf755db
SHA5125b5aad2f7054a27b02e55d3f11519ccb35eb19bfb407bb1d686f9c9a36562fde8656b6585b0be96e5ba8154de8d1e6a3d84bfbabf1122fc9dacb7d7ea25cfaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cde46682d54180cbc45121be295ce31
SHA1b39bcca8ca15c797b41c6df0602964866e33c95c
SHA2566f5bfd39fe2f37ac8475d7e717900fcf8df37e2c5a4750d03791db55b4c6856b
SHA5124903cfeae1f5f840a5b29ce07d9417823023723a1552d391d13659b925d16f055f1a7810db7f7e0f25a5976efa27b51d0a022222b75d29abaa6d4c5f8bb831d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b5fda61fd61152a9abdb692b6408fa1
SHA1d9975f37bd12e21cb9b10c0647f33772391ed86a
SHA2563a613904f3765cd8aedf81b252f60232a553a73c5a17ccc9509ae96ca25b2f6b
SHA512a7f59e66b8695edef22f1487f6d79f6f5ea6b768f9fdbd2464e058225246e1b6b4ed9a506a4f87e02c641fdb6d218e077945b9b1f2d4624f71da21943a782e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967b4e310ddce99f6c30cc85057cfb9f
SHA19ae2a98ba4012b8ef2be6d600d06f053935ede57
SHA256f1a4daaf5b165b3a9e1e63d7fb12a3e32315778b294f78fff775230269f6f2e8
SHA5122234bf42ccd6a97679fc451fc71488bec52a45c0bd4a5261618d414b1741d1288156809ccd47b0946ef046e66f7b81cce2cccf9b41f1f32070659a986f84e4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cea85cd6ff056c9bd91faad0b4f2e109
SHA1b8ecdf9a05785ce9100c800b9a30bb15898274cb
SHA256734fc0bf74eee08609046e94b89b1dc8ee7070ed079ebf0ad94ae7ed3a756ca2
SHA5120c9f8cb4112e2b9fda392fe9e91026b40ab291b49ac48592b52299f5bcbb9e1604b069b097d0b6b9e95095b2c3105ecca287ece607a5601bfc187535aab7c466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522363b9b837109326edb759f24c7c734
SHA1446c08fb033a311b1d9df620422d9d568ad79be9
SHA2569402ff69175382445e482998343b1a46762ffa4d34aa197bdc2c28360fb600f2
SHA51260afaf0c430d14c8b4f6a295ab21544d0c102a05f9bf551f48c7ce413878974429cfaae32898fec2685fe51d216c9f19908bae8bb633587c82747724914caa1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7bfa1ec8785f521fe5559b9f1de036f
SHA17240eb92a5ef39f1f2346c30e26d2350996680ef
SHA2563fd8ffc63890a7e3891145ed3ff754264654646b47f7d76f6e9a0cef6fe80188
SHA512eaedb0c0e70bff1ea3219baa4e1159e922be1fbe4d6a4b23b06e8cc12b0cdf007db9ab7eae3d9a3bb4feffba9f7555cfc173558d1bd0e6a1d8228da70542f9a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ac27496b30bd01af57ed7031b49e85e
SHA1417058964ede7fd570958a16aed3952971474edd
SHA256493f9739aafbbfa16a2ac6a90543dd9b5a78e3d3dc6bfa899a0fa3f0c0153ce9
SHA5121c11ac2d133fda7ae275a34b0826b650795ee3b88a724939692d14cd15d1c156f397a7b661b60ccc3210f5efb15991905d2e3e67c5c7d54ba86a1bb2804195da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53479c9d598719f19755bccc688af32c2
SHA1f7f5042822c0de9118cd3e5bff439b1f92a254a9
SHA2560d6e3aac7a680abb82cfb839e3820e77d075f5b72adf591e9cd2f27ecc876906
SHA512d45d9bd2b0d74d5ea4b3479fb60285f94812dccd17eb608e07a2aa3b4349afc96b0d36e3af7fdf5afffb9bbba9e4ab304f7d6d34c5273d26f6dd0aba22f09a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5c9b31147ccc403d2e8ef7899cf6686
SHA15a2a22a07776e4c707d0a905282e97f28f418329
SHA2563f8c7686da0a1eea6b8951568d3e6f4a019f5e4b44ec38f7a161d57302c427ab
SHA51257a321f93af70c40c8318b56c047314beed87f4c4d58cfd3955463de461b1bc7ce5560c4d38f2eceed08aa3256a21ef773fc8025519ad8cd2fe85e6f180a14d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56688d753b927aa833e2370bd77b6befa
SHA1b36e3e49dfec4e5cf6838ebf0f5659f23cdba764
SHA256f14a6f01fc764d5101c41a0cfe5f429190325f8cebfb8bf2341e8fc9bb2fbf4d
SHA512fa999847170debd711184302fcc659df4db67efbe54a0f892562a8173c5d6ec0824b7898af60b74569134c3304a89a64cd7c980f2e404197d73f4334840079c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dea014ed9ef6d765025d74f682b124c
SHA1cff8ef614dc49562768592506aeb1f9956e55a2f
SHA2564a7a50ac83166cd02f0918ada3428a55702ab85de25978ae431778770b7bad83
SHA51250fbe42c2579ed6cc62ac0a92333d242ea7704d6caa08bd9194ab4ecbd45f0e221850a4184559ac1ae4f56058823f8bf240b29e6cc4f796adcaf536da76423e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9c318b7f51aef0e407d0980306dcd06
SHA1d2ccf7f42a460f61a376d93df6c252b8d7574db7
SHA2568c7a52c311952e9cfa7bbe69b02c938b814d3c3368f3cc6d4ec930411de0249e
SHA512165d8bd6ea9236ab77f9f1df0b2260867d92dce30b90e77dc977cb37ae1070542117d8111390f92135e651b86210cbadd5b5ad3ff869c667f53f4bcfea7749df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6e41fb5bf468caf1eaa5e522c154ce8
SHA1dd17420547bb2ebb051554ebd58d4f47e6072ee4
SHA256add4f3609e4e5c660457fe760df981867372fb9c86dd645e640e70a55414be92
SHA512509bcd09dcbcfed45ba9a9b5a1e6b6e5ca19f1df10b5d496239281edc7f25ad82e8c7880641010937d3432dd81c7518b84d914b1b254b862c0a89fb169c16e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2044494438a1342daff70d2e89b733b
SHA180282f9fe2bcb6a0b067b819d42e48263621d8ec
SHA256461f957b79c3859b647206d0acf97a5e1c50f8c7e51d12f9714ca7528fbe9927
SHA512455320681a3a838c4548b28274e86aef3eb3bc660303733d5a829f3f383289ca727814784aa245bf3a95dbe56e6651ef6858ddac863fd3028d6fda8ed0948aa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5fb28014e42202098b297969a05d84f
SHA13d237642666df83682f16759d3bafe8929e89a38
SHA2569f56f96a4f2200c3dc91908e9aac3c617b0541e812f3da0a558a0d79c20517d9
SHA512daf85eb7aa52db1be58ad50e2f384425e0664a95d573841f8d17b7a4dde3d77086f46c251f953012c4ba97f820486b4dd95bf7f8ba9fe805c9f6bb12df2a29da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ea1bc4240532195b6f1da5d2138133c
SHA1587cc4b195307df96f4be7e1725e283ed65adfc8
SHA2561d3351f1fb83bf8b094c86622dc0c285692fb21499514b204782ffaf363452f1
SHA512a627b0e6e9e14ea11c03c6aa9f03d03ae0746ab77af3151236ff55ef89b458f8d8caf1b5362cadb40545faad716f9380d368c97881f1e777e3b94ec6df8193ab
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a