Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
e90da9badd407eb035fe4433e2864bb0_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e90da9badd407eb035fe4433e2864bb0_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e90da9badd407eb035fe4433e2864bb0_JaffaCakes118.html
-
Size
4KB
-
MD5
e90da9badd407eb035fe4433e2864bb0
-
SHA1
87c88e6fb48ed775dc33063e7b71e3d82ebe1b29
-
SHA256
bd423f94eb0e28b9e3a480f22fb290b841928776f07f726fcad5332814d6c2a1
-
SHA512
4dcea5d96fc85e4df0c854fbbaae4edbbd1cff70415847a496c2636739fa61733e7c8adb35ffdb3a29bd87c38699b863549b3229eb93f26de8fcda14ad41663c
-
SSDEEP
96:BKE2RjqlvvvnyLFcsOZ3FaagNTAag4mhID786gB0HM:w5RjqlvvvnwzORgauAag4eApgB0HM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418793222" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01fa685298ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a529a2e22ae42f4084bf8a2f7b0415b2000000000200000000001066000000010000200000001f2f74fa6058025d27866f6d23bf62f5bc73aa0fd751943e724ea478327e37bd000000000e800000000200002000000092e2902f277ac4878d6e01bf5c02ba266d342591ca7619874d6efb9af3d3bf5120000000f168388f2655a6832c55894437b6097ba8dd70d0fb19b530cbf63d1196b0f08140000000ff52e83c2c7e7299f511ef0c2665c204f09b0da113d10adaa5ef868812609d2d84c35fe11a52780df86899ccc16b7836353ea137180fcc3a1205102f0858a672 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE69A3A1-F61C-11EE-B6C6-569B02648541} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE 2232 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2232 1900 iexplore.exe 28 PID 1900 wrote to memory of 2232 1900 iexplore.exe 28 PID 1900 wrote to memory of 2232 1900 iexplore.exe 28 PID 1900 wrote to memory of 2232 1900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e90da9badd407eb035fe4433e2864bb0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afe7e512cd4839669129c81edff74b9d
SHA1a24f6609493d17f81950c27397d8ccd9d3ca8186
SHA256f40be767420cbd2f1e5082c923338cbb7545df380277249ff88af12ab5f1a242
SHA512fb731e7ec4e7c8483c1d11bfd197b35f3a1a9fa323234c05e1942fc4d5b29009d8d28be27329b3f5a6bca086518f46df46973d27376512403d5a8244013b250d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c0426eab9bcd0d17c02f4d5eb4d8a44
SHA1baa8f7021924d895512260584d2a17a33201c5f7
SHA256cfc0af96c0379fd7dcbcbae2e0180f7a4c3c7ae80f4568f24a006d92412023b2
SHA512b6e8e0200e20eb4bdab105672b459edd22e68dddb89a9ae43c726e571e5763802bdd9e39d6915bdc3c7937afe89ee96a0f2548e3100ebc249fa69b82a2558d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575bd060d53cdf641a80a4c9be2aca155
SHA17ded64735c089681e9ca8162e7475dec1a2f78f6
SHA2560c4430b6ec48197b0b453284cfa41ffc600ea92d83b2cb3521584cd3d5c3f36e
SHA512b60c4d5b4982c6520ae3504e94e16502873ecc58b1435570a014bef207a0a2e7988fa0fd0403fd565db033d480be2f882d3145aab315504df84c34c65620862b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57460635b1d92ead8fbcb9e2b13d9cd76
SHA12471258b72791e6cf1c64f6041e2346b646533e7
SHA25628d0eca81d508adf72556f6696f660abd1556a9ada439b54a8a8e96d6e308b6f
SHA512b8342d79851ef4d404f9faf883d3f2a1db35f33eccbed3cb4e1db7a4ebc46322a4ba15679703575634be2ac0ed490fd24f49aecf9fa7d63e00b8a08d7adc3231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54cef5a49853d0b58c3aad1f65ec63818
SHA1b64a3d61e3f0580ed6947b159a1929d58e8d2235
SHA2568d37d7ad3b85758c54e3a128b188dc72cfc6505f75fb4eae83ab86eb5bf98fed
SHA512cec44b58ebcd806bec429134fe356558cfe49c6fc075929f0076a49a554cce088ef564a8c84f891d6d274da5ed00a956ec20a6ee95a7480466da92cb846ff972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549d47a192d2aa22b4b66c49a33b45d8
SHA117fedc48368d301b88a39da452bb405b9009bf90
SHA2565c906099be0e3c3cd8374c311e2d423a48ed2eccdb0ea620f1c208065fe4108d
SHA512d33f17e6f8c3b5a698c557b04811e57214aaf7eae3693d39520c27dac75a2d72fe75d1958805cf4b1904ec20ad1b04fdad7740f97327e61693c9aca8a39edd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca550b0628a544d142cf5a300e921d8c
SHA1823b3b9b0cfab1976b8720fb19d27299decb230a
SHA25628758aedc72f2bf065de675103c1a496411347021d2a142daa34ead5c604143f
SHA512f7db3643045e9097228285abf6f9997d5e02712974eb732035e2af3699350e6f23758818647b2e040f6d8fe051d25be16298f0edef7c4a988e67d43048437afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c098983b64802c1f3d5257824b138d97
SHA1b268ad697f58fe1c2dfd7ed148923706fb453554
SHA2565527cbe060bc632a1f0902a0ad6d7ee936509670928177c22ffa4cdb89fbeb5d
SHA512e2b899c2144699b75c4d57e520247a3d62402c273b1a8c23c939d62d8c99208f0bfc93b1e3e1fe4d5cfacc87d30d946fbf37b0e13de1253e5b14df22809e6692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f53a36f3b77357bda0134bfe4d352e7
SHA1cb297cf403aea233adb5b1a555dd2cb849887e00
SHA256aaa984aeaf2c4aac7b7883c5c0a40f97d2c98fc3bb13cd04ecac21e0bc597c23
SHA512f499bf89536bf56eeb26d426ae8d756e05e3658bf6e80c518107eecc626d5547a999c2b386165e5b322d4435829df8baecaac6d91dc04df390eabe48e7c8432b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb45aa0591a20196f7aa60ff4f42b69c
SHA10eb864e0503ace0b023d8f3e9511e4b43e150846
SHA25670f3eb2a97e437a3d7bb0ed70f6ee39f6e750a42f974cf31137c76e89fd2d011
SHA51294bf468170b3038410ecd403270378d53dc72d2f8e9f4ad547ad9dc601f23c49dbf8708059585b72bb91d982c942c456e63ec2c2d1e224e59820cde908626df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da512aae87b5529e523bf1b446901482
SHA10ac0b7b37e0482f5a3bb0ef3e7908cbae26ccf91
SHA256ca18d722d5fe17c4556d9e10a4deb6a892facabe23c0bdf7d948a4158e2ac8c7
SHA512aaeb968983a6e1d177dd550b4f3268a3476cdba7cd1e95a1c290002847ae93cb565faddf0e9f4e4b4d9cae47ad56b1be651471f5648e4ab6c3291f0a5da74f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f22873958f41800552d0d2902e107b
SHA112bd0864d2f7bb139b485b5565ea151200203ae8
SHA256325abdbb47e4e2fa941e19d9160fe6614b5225150360fec6d57d55da9e04aea0
SHA512506ce5c673422eef13d2ec20a84ed2c3705240fc9c3b9cf8c9ab8e89f87ddef95041129a2bc5289c4db9ba9c43e2f8ba773b39c171cae8bbbde09f7bac8e2036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e44677d2c8140927379e4fbec8e3b2ce
SHA142f276a64d42df1b37cfa5d81d3209b8c9d16d4c
SHA256526d2984fd38c545b24fd168433e07f5ad7d268fbb65ce7eb2601cbabef15a23
SHA512b9e289336d4eb13eee7176b8aacbbe34543d3ca82965aadfd389e1b16ebf929ba0236b4efaee1fc27e8205a2aff19446416cf6e55946d534f7d475974e5caa84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d951d6f47fb2603aa6381028317d3a63
SHA18e001c1dfb7bc8ab5b1fc877e7e4db1bd4c384c4
SHA25689b3bb7b847145e473a8db0e77a97932ad25903344dd8d4a93fcd703656ad4a8
SHA5128471eb2317fca3a5f91d405cf13621725232dbd24f5b8b47bc86313964e38fbe59bb39a096b70f6507e725077327be41d7a943293282cd1a5e1740190535e811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b7dc71013ddc161f73ab42606e96824
SHA1247f0f272aed2f79eb7d6dfeb028a3c89b332a82
SHA256380309bb8c134e596c89266b5f9d72c5071f33d05bbd3f95532cb67f8e031b01
SHA512b23169a5a29f1c14da52d721d68404a3b3fd59575fa0698ddb2f339d06f445b047a0bd9714d63e7e508f16a953485a9126bfeb2a0d5aef9f1c9c6305c5dcb0fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb975d8b8719ab39aa043c8169cbeb5e
SHA1c6afe2ca7cd1eb4a71ba56d55fc19708d2649823
SHA25685c09826ca760d10f28b2ed2b82e3b11e9bfeb953cf5e3f2d7fc76d4ffea2f8a
SHA51219d13e9d629f4f392b1254a5d1143d03e251b6db9b1ba8bc508e4b3ffed8295df1752f82ebe1de4a8b3cc0de05e1c67501e418a420f01ae229ab1226df5f7748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e313782a6362342175f71a1cc7e883f7
SHA1c03cbecaba900e9a0d4967daf4a095f4b3a84792
SHA2562d3d1454db8fff25d4d44ae7f2d6d74b1b758af792f867af48847d0b5bf55d8a
SHA51211c2381ecd418d2fbb6c7e06e5a368d59bf6a3210b2275a5d5373f26b5f24c4354c70389a1b515179eeadc6b1a761cab39ba07abed90c78bcb92a41979751453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40869101059a75f0c8e4c3da34f3dbf
SHA16db5985c39cfdab04f46a8c9f5a7b60bfbfe20ba
SHA2568e9db542680db925550409c272d1479988ead74150a1c3178d4adaf65742c335
SHA51275efbe1cc686e38550f2bac54c5cc4ca0f5aba824ad2788e28ea6d39fd29eb8c587f45ecc6957dc63e4da6d29cf5c85080406db7c8523901ca5b141438790bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db9473d1a93aab4754d5479cd3484464
SHA15f109e1ce71a24d6406b3d4f28071d02ae349b5b
SHA25611729f02fc6bf7c897ba6ddd588f5f818fef5b1cd3ef37ea5c345e8262823021
SHA5121386e67a75ca6668939fb95d3f07b73dcc37d3cc287d80a22220f1741e7517d7ac0de0d614d5bde6503abc3e05ec4438abc7abda3a6100309ba04bb50c59013f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d90f45b743e79eeb83dde6fff924a7
SHA15092ced6d4e14f2d705beafde5f3839800584608
SHA2564ffcae4134e8374dfa31bd08e863ec20c63155a83a80220b7cb051a6ab984d56
SHA51233a513e33cbdf8600fd7a41649a379001c02385a914f7b76c086b172adf2acd2787ac103989d2b5847d12d87e289b11a767f517e4af723f9f1d97b1f738fe06f
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a