Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
7804152f78e12883cf0dcdcd80601782_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7804152f78e12883cf0dcdcd80601782_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7804152f78e12883cf0dcdcd80601782_JaffaCakes118.html
-
Size
40KB
-
MD5
7804152f78e12883cf0dcdcd80601782
-
SHA1
6e4850f106ec1f9c214fdc0df2a4be3a9a142b25
-
SHA256
6d6987408ce3edfb2717c7e922261bc8a04731d8d4f6772d81d4c89cafe2879b
-
SHA512
1de5965c167bf413db39ca9b9a6191a8cdb35453a1689953900646bbef003adfd9ddb1a58c1ef4852ea169140a40378bf25b82c66d0af59f1c2f413edfae4d1e
-
SSDEEP
768:QZlebpUZ0LmN5ANPeoWdLSZz/7/LyZauAGfZNe2gwWyD2wHcgjIQC6Auw87BjxeA:QZlebpUZ0LmN5ANPeoWdLSZz/7/LyZas
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FAF17451-1BE7-11EF-8B04-EAF6CDD7B231} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422948730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000053d2261b69471764e0ad14a811dbf8154205bd1be821ee4eedca37ad8ad1f79e000000000e800000000200002000000057bbeb3f3922965d909c41e837d60120fb2f0feb1ed4b79db9d9b471db590acb2000000021914fb6b16723cb72bcfddf99298173fb34f9f1b0b69e31046de353d79e36ad400000004834e19f42acf3048fac336e6cd8a5def9e9ddf5522b3c892daaa9658ea03e34fc07dda4b477ef2386f0eb6cc396e999411b43a6e9a7981b099c349c93588244 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50bfb4d3f4afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d745743a16a77afb6c6afc4ef5e89378de3bebf2b788d1f03909b833df1a0d42000000000e8000000002000020000000fdeda8ffe65b314c24bc5fdd028185058a271c4f30f3e50641cdbc0fdf2e3edb900000003f55aec95279735167ae4202e140884daf5d9397239825af0dc972ec760a35d6f5bda35cac41b9631e4e749e6a22698af887f39e7a39ebe713823cf183abc3359ca1cae510baccac62d48034be051136ebdb31c3fe5b5ae78793e00fdb512ac95ac0a6ba49363d8ae239af967ea7769cc4c24cdc0457b7e74fb952e4938a73ce94ab0e412b03f238c69a0aa02dde5ad4400000002e4375a84c007bbb0ca6648ce8a7641a2253b37f213249d850e8d02d5417ff44c761480296937cb1bd53d21167752fc17872c765ff0a965366ea0934f77dea93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2560 2368 iexplore.exe 28 PID 2368 wrote to memory of 2560 2368 iexplore.exe 28 PID 2368 wrote to memory of 2560 2368 iexplore.exe 28 PID 2368 wrote to memory of 2560 2368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7804152f78e12883cf0dcdcd80601782_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503B
MD5a08d30947d8bd792b0d0636c52cae5b5
SHA1d081a93e7b4cbbd22a26c334d99e5858809a2144
SHA2562eacc1e7fae71519fb669b86ae5b4af0357a3227d0de4453ea4de2d1b44ea590
SHA512ee95e650a69a25c539044eec4d9df61c61c28d8940e9e3fdb787863d5f02899575ac66c8b3b3cc093c094d45caeb8b5dc414eb45176391849637ad30b37e5793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5394b4abd1276ce22c3a63ea6e86f0fc3
SHA1ab5541350b60bffb8c4f475a2f558c05932040e1
SHA2569b9700a814045ee799cf5ba1d1bb1c32245e6e466bdc03bd7c05d0fb3171cfa2
SHA512f8c0daed720d38233a2cebc1500a6a428b807febfba37541fe7b602762adaff2554bba48b371b799fb0f520c2084bbff671362d9f62363153921b13688c58be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54631f1155a66f49b19e7a5afdf322694
SHA1a3895f341176cffdf0eb852e15444c4d5fb6a501
SHA2562936e7a6fe1344390a70fb7c2dc598be353ec712328bfc74df6e71f0efc0dc51
SHA51231c1b422057e99a8ed595a5bb9da2b27ee079e3de767b507a657c0c08d54bb45f5d1fba50d688a112179861012c7e9d876edfcecf495b0bb9be99c989d4854ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5db26ee27e4866f9c56637ec52c630d
SHA12ef498bb7b1beeee609bdcdf214937c3d821f3dd
SHA2563c1ba909067cd8b5870c438efe038a7b24c77af1eb136a77de18ef5654102411
SHA5128d2d920e69791d6420292fa4d87c4e5be491a207e5d68e7cf9a7bdb8e13e05b15319d4c784c0e1a8f752e2303740f20cf06a70e48a9f65b8ebef11a8d825f764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bdba44683393889a2f4bfe92884172f
SHA18218accfe75971c1ec7516632205228718796f6a
SHA256a6242086d7d926c7af6848027dfa321a63178cbca75dfed134df755436c6d00e
SHA512ede17dd45f153700534ae1395557f4fb8473728cedce1f9d2ddf3c23a6a9507a9c447e6870c26a6722750ca31960cfd992afec05864e2a13561f2398138765a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bc036d4fd38be7f7c7cdcd618b765fd
SHA183245aa61df2cbeffad356981595a27245ddc988
SHA256edb45cdcc0ac99adf96e8b130ca836e99cfaf05d707c4de3a5c1fb85a3bed38b
SHA5123c1b9b2e8a6c851efc0b329c83bc3a0f65eaa3a5f3532647d46c2185fd6d85a304b9dc09cef073e1c1f72ce57e11c3dc7afc4af69cc2910c8df0c0a12c4392a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fb522d92512a5244b63621a4b14ac2b
SHA16338b3c01ac11672ca0e1619befdb3de3fb91cca
SHA2569dac9ffcddb9f025b73ebf33fdd535b7c9f6c990a8f166b3c9a2fbe55879eb3e
SHA5127028cbabe82c2706f9d786311682ac91f733a2c2fb46d294ac6ffb3c90f8ac1b8cd48851543d5e55c024292317cb9788d5ec952b613c4b9be1643d99e674c87b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4356093272db06394d3441779d2df75
SHA10d98b73a2d65b9d654126f752461df32979701d8
SHA256566d62867df7b9ed8cf69d23d6b3ec275efbc5225d1092f22ddaa36d9860bf8d
SHA5128b26296f1479f4b70c1637cd569c0326bf1c0f6639bcb7a18ce6e90a454e5638f60a18fee784d5ed6720cd25f00d095e0446461271511cc82fa38dbba08b66a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523ff22ad9b48e2174eebb56348a5ee6e
SHA1d654818f43da554115d5829bd7855f7a137ad2a8
SHA2568a1509e54a87e18aa692ac51e749988bd921c71da70ed9fa4a168570fdc5e729
SHA5122be63155922e9e5301e31cfebe711e2467b5873879982f80740012d9c33a4528afbcdc492f82beb1cf04b35a172f5c45a2cd7328111b9d8fc0a15d26a0f5edb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d512c141a2626bae836ad482d7abafc
SHA1a5ad95c1da3d0adb4d6707226a5d8049f50d7531
SHA25650b44c4b94d50f88ee16ffc946eba4f0b068d71837c437a44651cf5c29242885
SHA512aef14ae6ef2671d7e1b67d275e26db820cc5935b58bf794f389a29486144f17aa4171f5420ba01cae1e625bcd1082ce40b12138ab4ee468f31661d15dd3c7fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a5ed263ab045d8350543eb1a473ce8
SHA1383df8fe4652306dd48385b8548b506c3ade3d55
SHA256a61d620414f445cc4e6735b012fb8aa0aab14eb1b60148145770467e3623359c
SHA512b58c6f2d52b149ef6817f0bc1a5dac4c4c8190c5eae51f1e38724eccbf59a8237cd8783bfe417a7852fd2275c2c745d9e11b7da383f0318f23082500f78a9fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca216d5e57c6399388dd964636d6dd86
SHA1b7300b462ffe3f1dd11c42388f09b404cb4a5d08
SHA2567be944cc99fc57046317c77ffbe093a995e7f91d15fb7878906335d128a693d4
SHA51261f9d5d8dc01a13cc64fef35a42aafcdf49c638cb3e930fcfff00edcd9ea6c7d3199aa50f8ac5f2040dcac9b6aaafa7dec3b3276bfffab8b327404e63771c375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8694348151bd5f0a74d032cc047556
SHA16169a9b53812e7e1ce31f8573e829fba2f68a243
SHA256514a8f346d46bea942cbe58a3ff960b899ed17ad692c14a7ccf668315f3feb07
SHA51273b40cf0926b068248ccae0ef906eb0fee2450fc6d8336e8970c670d24025867fa310179b82f3d1876748cf307bbd5271ea36db0312aeafca51dff445183a64b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d955a0b72f4473e60059cdc648d359de
SHA16fa74dcff8c78dd433f262af536aeea072def8fc
SHA2567d86c4e8e81af1c8f2b23cd894279f6c3d2162c59f70dd6a50cafea52ef9f429
SHA51247d9d1e4a903e650c6e24396c41965fd7d12a5268eea440a595d547cae66e6ac70808a1d0d00b360f4cba7d8c4e5f182383fe38f9f3415fb04b523d51748b381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd6d04a0860112fdf5a07a0bd6d0eaf
SHA11db72d4a465ee408704e08c522cf31280bd44c7f
SHA256fcf7226790a8827c31b5b4115eaf16f08f36a006d50a6ea86425a5b2f1aff00e
SHA51219266fd714cf3be2a2a52571923a0609c60d36a5a64c7d7aa4f5016499ef8a731a0ff6d3b3e00a7a2776541bf8305f65ba8de907e41b32eb6a19bf14a4b88732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537cf876b878fa7a83440741d2f4d74ad
SHA138340792b37d29f69ad9c5d0494ecd3c4249e22d
SHA256d7fd44ad42839b4cc686e57c6775bffdad253c3f29c9ef9d1b1934e8ce07990a
SHA512164172e3f84dcc5385aec40ce071560b95472e8923e5610a52a2b416bce57b936ef8cca91f59facd2d9d6c87a0ae00f808af8cf412799f349751e1defbbdd96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a70ba065303ec9f4c14e60ba2562185
SHA11611d487553e1cce7291f76c1204355e1fa5898f
SHA2567d9749d1dbbe07bf9da0812e1e0a0285315d7077f6cef030b74dd9b7b06fd691
SHA5121b869a886693d654fdd882963f48c0291bdc288b3a6576cf93438381cee0d7e69af233a9dbc49b25d462fde158e38cfa0797e2d5b0ff0f3d4a9a269192c44803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e36c461f8c9ada5ee27b6002da0faf
SHA17e954fb0124e22e40ae71e509f8b5b95c56ad0bd
SHA2563a898ccd83c961caabd4acbc8b9fce32ba7bfc1f49ed57bde6912956226ad0c3
SHA5122cee56615f85db12b9554183811d7af22d6e6cb52ee34eec5669c10288e16f14c56683dfcab7c64e74e9b772031d4faf5a49b8429859b8de8870797a4d04c650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534f2d923636eee0df29f15666085440e
SHA17984e5555cf3ccd79dc4be79e0ac3ae440ab60f2
SHA25642ec3f2014dc3adbf122b6d7fa1a3c950546803b99f0490e513748f66ef530c3
SHA512cf6b160c19fb340a593c412a4c0bd76fa795d401d4a11d2c224a0fa89ab0d9e0502ade62f6cc06e53b620d7479c0950e5624ad24da85f815c9d2a7ae1dc06b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530d327123b9205f01bcde5344e209ae3
SHA11ce6aeeecb15747a52c5b3bfa5e977ccea17e5b3
SHA256aee57586e7e9bfaf2b0c0257876b1e03e2b9d2eb5ef06e4aa72efcefd10b30d1
SHA512d0342d2d3867e7f6eb404228388e24141e80fc4ac994b74f8b4fe7dfc023b0ec90363a3466cd2bfe7dffdbc24ba7f3ed5da7b7bde7384472823d322becb44667
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\prototype[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a