Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
0fc3d9f030f39646aacf60e99a8188fd_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0fc3d9f030f39646aacf60e99a8188fd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0fc3d9f030f39646aacf60e99a8188fd_JaffaCakes118.html
-
Size
44KB
-
MD5
0fc3d9f030f39646aacf60e99a8188fd
-
SHA1
b6e5445eee109ab6b3b8d961b1d18f6ba9d6871c
-
SHA256
91b545ab0c08bdd429d8e8a9e16f2b9e34deb3e850c4a24ea8545e6a8817464a
-
SHA512
ba1cccdaa08c70bf919f19834a1ff1fc42eba04df7541e04964c75dbbbee34b214f810c2e77db4218dc712d40401867f76b60e31c23841b8ca24141e07a77e95
-
SSDEEP
768:R7dQeZ6IGk9vs9n5fmRDAACxCaGpt/Zv/jPAsJbbJKlEgKESwUL2yXdgeYXxdYbL:RJQeZ6IGk9vs95fmMxCaGpt/Zv/jPAsv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420875686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000190af4e1dad28580ec477df1e77efe3601f38a17a1341062506c15096c356777000000000e80000000020000200000000b1ffa3dbef3894abd36a59dc7f2b7065c39a17ba5fcd749e35669df129e05a02000000045e6f3cc2568110f938efa4b7c8046b9ffc4494f9fd630730f5ca250ef7b31b9400000003f5337ee84534bedac8e390e80e8fda9c70e0b737a56cb294db27fbcfadc6b7854f9b5cec46a7bdeafb2845bfc0eeb8837af9772c46894c1c5e94f6bfd40e931 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C6D40E1-090D-11EF-B837-5AD7C7D11D06} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04a74621a9dda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000001a3adf78b11d8c7cbef920f45519e130e1633aedbe7e84365897b095525b794e000000000e80000000020000200000004f8259751912eefa6f15523fbab013549ca69e4a1c7db09194949568d076c31f90000000a44de07f6945f14ed4226c03d6536399a132e91c906eb06354ce4f83cde20e9e9fdab957e3fd02953d8f06cd5fde931f20b745d3d098fce296d90076348f0a9515dbbb3f76ec28f3eb186e793d36b58657e91a66e816890af2687d1ec9be468f7a28f80c589135ce5e133fd440a2b8539db12ae06ae41bb20553726c4bdc23063fb32a352e9071e58a414602d5d2f80d4000000068df474ebc197863b8e20151f849683328d5621d3ad506fe8a38d9d2e6b9591182c00f45ff8e0a33af52a218733ea3f67ceaddc93aeab43717299ee4ee30138a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2872 2440 iexplore.exe 28 PID 2440 wrote to memory of 2872 2440 iexplore.exe 28 PID 2440 wrote to memory of 2872 2440 iexplore.exe 28 PID 2440 wrote to memory of 2872 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fc3d9f030f39646aacf60e99a8188fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dae92b214d8d9431acdc8484b501ec86
SHA12582ebb699682adcc8c64b6636855afe7188e0b8
SHA25651e505fbc1622369826e457c95a1571c4168d84a2ff79606209ff103714718d4
SHA512c620a514b949a0c2ea8c617fe50df13f1f39f62e281b0c7128b9b3f0b88744f5efc89cc7e4850ade1adf8c89b159c76b5c3e414d4fb3f2d09e3eaa6873986c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee97439910e6b2b78eabf6f85e1011d2
SHA10cad43e0b24a7bcb0a970b31e816283f45900636
SHA25658e1a28774d3e2003935fba6737114e2aacf90bbc288e7f0791c4d9d73cc028a
SHA51224527b719e35bd5c667694c1d5f5262c1bcf9a6a41da6fc3f2dd8eff02ffd7708c36c52769cf8bdd44ae239a813fea7ee098010b7a121f9c9e0f7559c14679c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8372d9688a707d613fc2afd4f5591c6
SHA100a898ca390fd1b47363200fda806595c521c792
SHA2563637823408fb219e6ac2847e8b5441368c2480c4a05456a646930b0643828bc1
SHA5121b4c3d1ac467499963e66908313a91bcb6ff38a06e660d500d6917880c5176401c5db6c8d6162cf116af537e1df398f303e3df1ad5f19a5f44127fc3dc1478b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bf0c80bc3313bc0236e3b3e66efab97
SHA1dd1146a4db0d41ddbba4beaa5f9680cb743d5424
SHA25680635310816630080bfdc4eda9561958f32f9bbc8a4ec22ffc2d50e473e78777
SHA5123b241ae3b50472946afb6957b3ba20686d0fa935a6025acb84232e6ef25bed82fe487367cf7cce2b0e8deb8d763f29a91a59326cca9cd7dd77f0aa496c71bc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9991123216dd3d52d79c9625f6b0190
SHA1a6acc66f06f90cb747fbfbb0e1f6c9b88a3e024a
SHA256e0fe012452438b196ce49293c4a78b537b0d5b4c94b72121e2b33292cc4ae4ae
SHA5126a5189d56f817e490954ac4313e040656845a43ebd57d1eda312044b8006a0af819ef16f2c763fbc43431f75277c06f95eada0f777c12923849516d50b373d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ff2206c2ca8996cdee48a57347d0509
SHA165378e0465f75b64ff22c8d57107bc8cb80f10f1
SHA25611a145ec3cc78315a13d6742748a5e2eb23accb2bec8f931c33a69ecaab24279
SHA512ffe09e1ae3d71ed03659a9277ce585988ada16bc5d10c0520fd32885eac981a2c3dd1cd983703863f04bba0904220fc9cd2549844e0df16101cf0a12db94e693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520033311d90fa8122daa533b6568a9a7
SHA18a0e9f5121aa540817aae536057f6aedcb50872f
SHA256efcd4ae0a667531c2160bdf215025783666e16715f22704e5be1684637928e91
SHA512a0ad67f5ac661ffa763f89578702d5c35b42ce445dc40ab3800c290c2364e8581fcd131e62eea44db1f04e3552b66767d72bf340ea0d456c9e879ce5e76e989d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6aeaa0fa4deccf1ed18b8816757ec6
SHA1ca65c70b044f8e9bdbb3bfc5df21d546b719aa9c
SHA256314d51ee3692dac4c0e8d959df63f13641d9ca08cc718c53a0be4a6d8b7881da
SHA5129f3e5b9caf3f9690c98ee6e7211f9b643dd533c06c2a4b0627937c80eaba1b06d93f6b8a9677a3c4ef6e80b7d5987880b02d796651c71e6e49b988e698d2eed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56334032c22440970cf77c6ad7d0c8bf4
SHA152273b76c2f8b3f690d92ffdcfd96e163c6dacf4
SHA256ef9f07b7489b5c519d571da7b5b1519027d6283b4e6e1819f80efb61833833cc
SHA512db54735397b27f478974bb22aa076aa11c4c466c3d9380e5deeba4342c0b5d1a451172d265b81fe35c69dc85837288c9b9e1fdb73da8d701605f4dd82cf9e095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508bc0c6bded548745a4e7568cf74067d
SHA1ef896aeae193400e77214f03aa2a6e2c25e9c176
SHA2568a18fcc5a74c23581c940f7800dee35b83204492da461f9dcc1672ad3abb4938
SHA512937de33587da9e6252a3cb48c9144cd5ad4d5c01017a768877a0eaf8994a685987bc18c1d8dc192d6cba020862833b8fbdd98cee26f372881a11eaf08754eb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5842bf0faf1331cb9f932023e0f77f09f
SHA141fa57f505c2c992a8862087fc6058d3cd766be3
SHA256c6482495a3325c157bbf25bd347b010d99f3d0dbf8822442ccfb355d0363eebe
SHA51249b3826620ebc807dddd6b077eb95656e4d6af27af05e2752217a1bb9c467d9309bf9d2a3f6abb8dc2bfd2e5befc0059433ff51ef0e962b19699b8b7144a90e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59216584c2b3e7854c238307a320cee41
SHA13d2a3518189a81e8ae92a47eebb2755ce067efed
SHA256b229085de14f4343eee3744889df5bdc64ff6f44c4c4712c19801079f12e3db8
SHA512138cbec9fa6cbf0a311bfd0279a7d101bcb8f0e7dae4edb8faac1b783aff8ff7a5caf14883a1514c240290ad37e61ba18543a8d0456c3d1249d81665e0814a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5319ed631f4274ea67ceac01ab3c3240c
SHA1422d0bdfdf18e04f39314b60057008c47f15eccc
SHA256439aa4bd08a48e149b0f40925ac08a6cc19f42655e557df6ff50a41dd45f64ce
SHA51271c6c76c7a8e7cd94a36bc50b46e67ef9f9e657f193dfe3c9c583d2c36cf1db0af2b0e987d18c2d0f9e4b32fe28b3d6232c4f226f92c5965d18d47d62198a55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b58e42b40ea68371c316cb7e145da11
SHA1998e77292ffa1c8d9b150be348f2f59d93c57151
SHA256893befcda52f2861c2c838e8269a5ce2c6e0373154ccae3bf96a8e8e0ed14087
SHA51292489987064ecddc66e43fef702ab8bbdb98133afaf82f4a4161d762ff093173d794a603c05c4041c3a0aad87b7db6ddef4bf759e16bea2959c9fb1cbd3df1b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506af7b11d38eedaede9c3c59838261dd
SHA1367e84b54cd443444364d1e39fd5313c19b41cc4
SHA256d5f169832bb0cbe2069e51ab8523ee7fb4fba6ad63e09131386dc72f39915852
SHA5122c1601d5099877b527e2c0961e351cc68ccf9d6af609db418d6d4d9b92ad0dc9136bd34a022509f2b1177c3842cc4814d8cafc52f79c21788b8bfab25cfbd557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9911f80d55a66c7098b6e4fa77d74de
SHA1d375e5c9ac54cf7ed81bdf593ebf6e6e0bf1fbf7
SHA2562a23142a6d037dd7f3e84443643578362cdfe037e79592e38e0c732ef5cec8c6
SHA512cc6e0235c690944348eb424cfdb7ae22053fbe412bf0333998715d37cf81f3c4ade74553883622bb95fd12f7d8a2703431e7a9ecef60c36decfcfa9a69989de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1af62cce37c8704557d687483ec6a26
SHA1fc6dfaa53e60d028244841bb58060caed3fa16a0
SHA256f1bdb0617880cd7bf2c7fa143cac17023c21082b125628d2b4c67dfebb02ac68
SHA5124a088a07153b887775b8e94f4fc58dd9facc1918eca65ee15364af9ceb52cdbca2efbf353ff86c62cf3465d21642ee613d305aa8b715015735631dbe8e44f01d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2450b0f35fb3b5ae9a1321273512a8c
SHA115d91c1244b745005ae2fffa1fd1d81582ee9e5a
SHA2560241bf6d35872d54e0ce9f86f28a34eb0666ef8064db6d53bca588068d0ecd98
SHA51263f5700555b67bca7c2f5e65df48a7feb610b183e14c3319550747cf46e0647551de1794923f6631e6038804ce1444d9f805d072c4110910c79af2104d07dc67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697e45c670a89ad5c22e30a12de1ba9b
SHA1d69e6109876d3c89d3ebf5f8dd15bf36d93f59bd
SHA256d6afcd320343fd31eba70a8e28f623034a994ecdf62967183608a6217d752a15
SHA51234713ab1de9ca22811a238e1a2506f1872b5dc38621958f8c85f2588cf0a6d0c19d66d7c3e12d9eba96a32dc9d490b7d727a7efe77f3ca3397c5d302f8d178c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf5228b0bcb254c9e9ca6d7258e606e5
SHA13ec2368c0e6eb5c0c68adba63f4af23e20d24fe9
SHA25664ae48490ebb903960efc2362c07eec037e4cb70ba180a6ecc2f27593dcb33df
SHA512467810183f211783601901ae613f90c48395a94f56824803d78aa80f00104aef89d9e53a46ed138aae087d28d51a29e52fecc44fb43b7ad783a899a0ec2a50fd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a