Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
80453ed572a2cc3a0e905cd874ef9bdf_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
80453ed572a2cc3a0e905cd874ef9bdf_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
80453ed572a2cc3a0e905cd874ef9bdf_JaffaCakes118.html
-
Size
21KB
-
MD5
80453ed572a2cc3a0e905cd874ef9bdf
-
SHA1
e7fc5d5b7a999127bd58749333fc796c13e787d1
-
SHA256
3dc6b0620e566398c8a47b6863fa3c3b98d3617e5135e05b77ab05577b9868c3
-
SHA512
bdf723fe0f6e5a2d303685b31b7d1ad4aafe33d4a60af7f1f6651053da26156da1e604dcab7448cb8c77b611cfbc70f30d1aeef52e14691f1de3b06514ce4f10
-
SSDEEP
384:SN1MrOOLueT9uYKr4nUy6pLtKeN13os8lQxuen1V:SN1MrOOLr5NKr/lrNosasRn1V
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000038fe25b894ff7a2eaed2e5ef911d0fd8c3b5a9fa4ffd682c17358fa3d2ee004b000000000e8000000002000020000000c714f7579eb80fe55a1c9a57cb4899890e0d89445b35f9da09932c326214287a20000000896983fbcc0ace932bbcb4ac58e924b320a2d583e6036a3b9f61204fabac76604000000059ebf3875e37742f3030ca74a1b2d594f547b138dd2a6c8d583a1ffc3923ca56f8d5ff01781ab0ea038cd28b1996f7a48140d77b95e44cd50b59dcf5e0f1cd35 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423136960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e0df060e4478a698f6695871e988d70f5473f878ec837a011ae100bd01a70981000000000e8000000002000020000000842d2ec525a1bd402c4e185196ea117e93f179f86e9bd7a4bd72978e11b7b9f9900000007af652c6f8caf962e0d6bcaab850c0d1ee0b00dc77e09b2ca0eede729f384fc1208d726ca25e1983c85fc2a63ab933449d522dbdca6245d1e58658e132b2ab6227f7e6a08ce3576374967e5e1bc7b8a6b8f18b55d8b85ca2bc1c4e1bd96e92898b323c0b909dbdc22fe0814ac49795ac3f86ed0dce8667c65b4000e8d6872352f55aa5bae17ae300e75eba40f6decea840000000b4826ebe2fa2d0024a4e4fe094b0daf80a6294e3d4ed9c858403516b1c52c01047d80d942a051ed94d6d1d6656f2283b838a9da3c03b911d20d8ab249b8b1a00 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f61b23abb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CDC5671-1D9E-11EF-B27D-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE 2136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2136 2848 iexplore.exe 28 PID 2848 wrote to memory of 2136 2848 iexplore.exe 28 PID 2848 wrote to memory of 2136 2848 iexplore.exe 28 PID 2848 wrote to memory of 2136 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\80453ed572a2cc3a0e905cd874ef9bdf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a04d5a918cec06079db5a74bc7c313
SHA16f23efc4e53b3c26b2f7925c1a2fb1ae4467823a
SHA256f8764bdc82f26c79746845b12773728fa75542fe7191d50a7c083f56c87469b1
SHA5120364cfcd20c4f2bf74a1ca90f9f726b129933affc13197ca58afce1c3bdbb29770112311b7f6bc27b1c8fefed7e4aabbb709c914ffeab0f8526e0b489e30dc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634df3f8022ed1ba25ba0c895d51b4e9
SHA15cc40553ac526109b09d9ae15e018b58242c52fa
SHA25646a002bd7f4a1d3d5d367cd2874f1fd3e5ee55d5ae3e3e441f6214466a20bc55
SHA512c9f4c64875f096cac7e5f88d3db71001d328af4c94af1ff2204eb2b1ffd5354e756ce48161444a83cd9a63dbe0ab46fdf4ea1e692b648e0558ef27cac569306a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c628e127b50ea194af1b973aa86a71
SHA16462cf16b353aefc98f6cffda9abbcfddd49034f
SHA256fb9f6a1104a39ebe6ae856f1080e1a04ffa2296d41264e5d6093f9e2f7caa4dc
SHA512823f928c9699b2518602b998e71f119636e966595e4e697f5bc69fcc35dd332a23116b3d11246929e2f6c5a7a3c6f0dbd97d5f360404307f9ba2002c575c9313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54557cf495a9122231b647df576b55494
SHA18652128fd16e0844e65182a51d3b714be0e73b30
SHA256e2e7d687bd0cf7393bfb22a055306bba125c2c145352e06b8a19a622b21d824f
SHA5124e9c1f4a808585b4db77d1e668408394dd14abb63c61877ec0f1d0d0d436230d1782116e099ef5e2eedac5e1ae69dc58c804ebd9279429e8ba05b9f76ac79c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec438bd413ca200a3438d0b7a90dd65
SHA118fe8738a41786ca4012502c31ac230cac7c5081
SHA2561e53a7a9254dd58b65aa6c8c940e9423043ceefc6d9359ff06b76b085a3b602d
SHA512ad982241573e2296d66ce5baa4c20f38f42674237e459337382aa3f618e55a33d2588a542d41ddf8f2d6a090df923ba10c694a3840e04fa096ee54a4f4c3b20d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58619d1c7abb2bc5d22bd99e5a3572097
SHA1e11d6f70d45c9678fb139d46100f1128b8738206
SHA2560572af6c90e13f08f847affd74ef35e82eb473567bd48f8958cf5ec5509ce52e
SHA51262239e790f355a628fa7206cef63c62a62882bbb7966ddc57f2e9a029b9f789f61b58f613bd632d2d7a9003c2fb9a5d9f00d771d54cb5db33c58ffa9b68dc825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1510c3ba08e88abf34d22d354e7d9d
SHA144dcda968713ebf8e8f12faa78ade42793c7dad7
SHA256d9d23e790cdd827cd0555a8c531bbde8b408adc6d44f2ab6491077f9be533821
SHA5120864957d498c50bae9888ca3a664e353a9b0b9ea8111eada6790ad340adacf63b0d031a97978f02a62385fa6b9ba0f1dd21802a407d0775c6b837a3301f7cc2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544be2fd15abf68f4d6dc685088596f0f
SHA19dda4357e2335e88aba289ce3bdb3235ab39f8cb
SHA2565ec65e2dc98a2f994085f39683338a06239becff112f7be8a400c49ab1dace5a
SHA512d36b5a230dc05a132971172580c4bcd85c4c63bddd9322a163746789ac6e611d658c4985d6974152cf5786221a86e07485cb9a5b37e37f55c7e0fcaaf4af94c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cad807d5ad4b4688a851384d6bc5f6a
SHA16118a201aec439592fe02a6661988fab0d93728c
SHA25628a309cd43950cc2c7c78832bfca446209ccda60ade62be30fa62c29b3b46cbd
SHA512f6fedfdd29a159619ef4dbff018c2c4c8b6a352e6609baaa043bdac9ab0937fc951e76d2bcf1e8caefee8d3fcbe2119a5270393fecc67bd855cf34fefadabed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56182f2907e2685d454bc23aa2194fd74
SHA16946b823f90c918b461379ca36a8b1928840c631
SHA2562de17f7b0fb23acd55e65d9d7049f51695670a401e0a16e530cb4e9cadddce63
SHA5128eb8a792b1c3b55b2a54ce53fbafcc530aba2717eeb1d07e71905f645943a237a6f890681dfa812a8a461e61cb8877a062c53ab9a78939a5d3eac2a6b87297c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c376d7f085d8a32c53bbc7ead41af607
SHA10076634a2f24057fa58db9f65c7fd2598cdddcf5
SHA25666178c2a22f5928f85c5e61534fded92ab361d868798caf34fce261bed0d99bf
SHA51271d12d3991a81da7e62abae871dfcb945ed6b10071144e1f4f390b59c7490716cd562562c8006892a7d099fcac0ee69139e5165fdee7ffc55cb086ed298593f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa40c16b747aadec9eb0a64ef532416
SHA12f3f9a3ea59fa4ae43c376fee0299c3a8c3aed4d
SHA25661649fec0c0ea094051361997eb5e2db3eec31949715627035de7724f8c181b5
SHA512a92d796972f0fe5d1bb6b4e501b953ac4e5e7d80558c96e150dc19d550750c57ceab535da54772470450d00b95438e0b20f526788edda0b34f550b138b44a040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a6091cbad48195da5d511a339d6630
SHA171bcf451a495aa2c12d5382d3e9d8481336da661
SHA2565d1452377fcff0abc689237a3ba9757af0babf52cc2e645f6ea2fd5e573aa4f1
SHA5123b517d16ca1bafe635ed114d77f8481bb2a5abc36c263ab276336e50388f1e3c14bd8da99de78dad2d1f561bf1d60286fd33eb774640e4bcd03ca2322fe06910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d05e09a15ca602fb132aa83574c072
SHA11d65534f59b6d0efa2911140f3465fc76da50890
SHA2566bbbbde735f2d455136cd594950903ab6bfc7b6ec589e85f8c63241061f68783
SHA512147d1be6f48849a0896f70dda62218169607d338b33721234a1d9c0524fc31fb2b1f32e11e6c1260725472dfd4229eae3e09b694e27a8d0d34867f44befe4c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b3da1658ad36c00ea5bd4243fd379fe
SHA1e2dc54f62454d086b8907fbbaa474eeb9af664ff
SHA2563acf18a22625ddc04794e5a344c8f4404585e136bf43fd2b15d5d7e346292c0d
SHA5129cd97cd4441c1cf46a409fb4e72f61dbc731bba9d11e790210869e7d6605e1b8b4ce5257fe00bb465845a4e05bff7eea6d22454ab809725d99a4d6f5af47708c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbd649e93ac2364d801a32369712418
SHA165bcdaa08890a9484e3c2012c954a79b96f9d0a3
SHA256f2e8fc96ce1194717f2b45599a4455a3703c8ada7774f2f30315d0dc0a3f6551
SHA5128096663125fe0509afe1bd436322552e790382d086a54bc8647626b3a1f1d991393b7bb4390d2284a3273d5eebf7922840eab0450ed91cbd3878e3a816d49ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ffea9cf99fec1b0081f2d3766efa8f
SHA12ce5584b8cfdd53406a227e4ef4e541083904afa
SHA256d06a5300bc22b5237114afb00861adde11f2b5d84d749cae6e9ab72f13da2690
SHA512b59bd638eacba06035cf39a8c5a724bf208ebec948b519c868d94c3721b8b469ef16b820b44a0ec361d9730fb7f3c1ee0c19616e3c2a6415792183deb8d93640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cb507ff62daa3210b7afdc97e71768
SHA18808a7e146043270db7ed590b4bcca300a15bf29
SHA256338aa7c7b35b90b7546afdb5c2d839c8cf1ecbaeebdf2fee5ca7c285ad7bd4c2
SHA51246579ab7ac35f5997576690a3fec75172de55f6f08966feb856904e2da0f079e3fb740cebb62499f167c9c4c3b82e99720b591e24a4708dba3bb2ad2dfc96dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb03fcb4f8d4b8c2e81df16e0c226ed1
SHA1021c8765f9d8d4bea8bd4864360ddee81c74d026
SHA256b8f021c77c871081fb30a8073dfc22c70cb891f28d6cc0fc628509082f461eec
SHA5128bb35013a49f278f6953d690dae0fab25e0ed1b38bd8c53eb189c387b087bf097634ec684d5c1bf86bd18c061c52e40829c6eb77350d7e9fbc524122bb562b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1395a938d896fedea05c99a2e74f823
SHA1fa81b4b834113a22ba0f653ff0c3cfe8db0cc567
SHA256b44105de8a8d785add41c0a569b33e5ccd10a4aff41f54c879c2b11a2ede0113
SHA512f9329d01d763ddde4fc92732c70a15af0fbbb0ba2adeee2308577a52b9db44ccede92cb7b12bcdccc8fcd07776c38a7dfca0c2d5bb17bf41130401aaf8006a77
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b