Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
1390c1163b91339fb274be62e835c5bc_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1390c1163b91339fb274be62e835c5bc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1390c1163b91339fb274be62e835c5bc_JaffaCakes118.html
-
Size
67KB
-
MD5
1390c1163b91339fb274be62e835c5bc
-
SHA1
4fa4c5b12ad7d76cac4acc3e63b400229a78e3f0
-
SHA256
a1aa635eb8947040da3ff016c2d7fe9ff53f95f17e774ee1bd3c0522ccfc33c4
-
SHA512
b6e7975abee3169579b355b13b3c0338880a91f6bc28bc82bc60624b56128b797c56f38a57c2f3c683e100b7baff1d337b0d0516cb7de6050d4b4807bd416c8b
-
SSDEEP
768:JiDgcMiR3sI2PDDnX0g6RkWU1yUJoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JdkxtTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA249E31-0A33-11EF-ADBF-FA30248A334C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000088ad576b341fb741fc5dd9389d45fb09042dfee87dcc904c39136f4fbf3dbb96000000000e80000000020000200000005742df489c242f424bf3487f5118d4da6dfcfbb9e4748e23f9ffe53de45be5a02000000091dcf5d2bcdbc9e18db9ae7a6b79fe7f1637ca681c9138b1bea8764d71466c18400000009a4640d80a1a21a24d605b51f52a8ea252c66f4588bbed8d3d6c175bfd7a5bafa478ddeedfc0742866cd8ddf19eef47a15b78981a58750faf841502c496885d1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c087b89e409eda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000050ee31fa13c068b11745d863f56e53a3bf927ae827d15d8c7f93b2e7e377a195000000000e8000000002000020000000de1a2af129c626ed6d6db4d29b4cf7c43debb3d2beff159cb163e73dcbd5149590000000e3d153b6915d79b03939879dbe63d308d1ff5f5b1184803c0cbe2e5d63f5a7b1f5812b8e773bdf81e5eb78dd8aca6b3bc0b0bfe14551f50b2e68ab7aab5d9d616636d94237babb41021a1e26254a87f1298c9d2fd60bdb8dc719015cb6d7b9843231585b8ea7fe5d171edd1c6274f5f4a7fe14594582283c83c31d4d03270cfd8cec1516c74e4ddcfdf3432e9f2a78f3400000001d82fcc03a01f2487d76c3dae0dea1084b4abf237101f5f1865c0e148c3869d20dab784fff8ae9a09c604bee56194871881cd4232d6f45b090ee799bcf67432f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421002169" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2752 2388 iexplore.exe 28 PID 2388 wrote to memory of 2752 2388 iexplore.exe 28 PID 2388 wrote to memory of 2752 2388 iexplore.exe 28 PID 2388 wrote to memory of 2752 2388 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1390c1163b91339fb274be62e835c5bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e6ee7d1ac0ae694ad43509ba7f241e
SHA17e7c33f1bdb86b74d748a12bcfb513fafa6256fd
SHA256852275a845921396adbedb8a34259bda1d938b5787b6bcd74bab52c0685ebf4d
SHA512500b9671df95b1599525826520f9993bf223fe444c11e0746f39c59d7a6f4b90f1400d88a36531e1af23dbfa103c72fddaeffc621eabdcab307f9614ccb8db4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b66af25e7abcb5bc131ac5265f0e0a90
SHA186e9f556d6ce99036d44c70579200d4b7dd75c35
SHA256e4d29bc8437968ce765e172aac02f220c7121c9d19e4958b3a3fcfc7632162c5
SHA5122cd6127d0d010557a258aa52c0ae37310a426f1be9c6bebdb2e9eb5158f2c2ee4c41eee700a3f3a9815ec6af81c3885af72a8d1d2b6889d8663af7d90b7c9bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b05622ab89075f0e549ebbc0addb50a
SHA134a2440914f796209f7a6d3646323474ad1efa13
SHA256d78b5be2af0bffd179c7f7a0571f6f21881c54d4a7dc75dcbb011d4d1d833f1b
SHA512b213d82b7915a375f094fcafc0a7ca8ee5558d941aa362fb59a9f537ab4d8ca02f90184f42016b91ff630b97610ca71318e81d735d7f2ca1b018313b0f7c3806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585ce7e53971fc434e0d4b7163880d91c
SHA194cb21dfd37024423b9f73ca5ad06d34d83acc46
SHA25662ca6a5c4fe10729b14081e899d4c90c69141a9f4148fafd2ae6b1c5509dab94
SHA512285d934fbe055009e5ec3298b875b9d786389a2bcd1bbc390b3adef602f76bd7f4bfd59140d6674fb9bbd6640565faffd42a1949ffb96139e8e90994826515f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511a25f85f1007ca0beee70267df823ed
SHA1e1d78e396cc847c11a7ccc846af2d7ab1b023657
SHA256f71b82fd35e8d6012b5612d0bbfb5522c59a6a6a3e1d1f244ae2a9ae43e860f3
SHA512483edce351565ec86d4ab6a6c8531119198f78c0121dbc40f48fdc7d6a30c4b10ea16a6d49c39f0efe8a2bace6af06ec9e10167c1a79c8fb7dd13df8d0a0d8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e77728e35dbd0f091ea5aa97b698ede5
SHA10cec0fd9207ee7a0d0d6055bf525f668ef953ca9
SHA25613825676b9ab8ce8e0f7046ce57b9dbc9d194e1fedbbb6be181baf8416865af6
SHA51234ceb1a157ec41181e113765b3785a08cff356bebffa42f85980d3f31d5590bfef5dbd997972afb472648bd601a0eac28691564e9a411c1489b413284c36b31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3fba15e6b804cc87a228bcfc75e0ff3
SHA1d09e78cb285139e3d562ef5eca7ae55e1c8ac44a
SHA256af34fee0a4f1f7d29d4b2427c91daa8b4e0eb91c65f01c1a65553f3ba09d6a2c
SHA5127a07000231affe201e1f8e6a4927ab3bb40007a580aebb911fd5d43b52c979ce8bfa3070f62284c9bc7e16fdc8c79288dcb7cc9f3306348ef8ab114313dc465f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f27e32359af66ffe7abeb3ec7ae178e
SHA171849fb9c47aa23679d257fb0509548801a3538c
SHA256bc20524ac5d0fe1b00693a7e8143381748e2d5a510d15ad010259ca92e4ce2fe
SHA512d9d84099821b5d8a11ba073fc6d3ceb266db39ab8c715949ec10e12563a16f7fc755d384f878dbccd728765db5bd3f961cd0bceee75a4311026edbc7f36d1220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c45064f18689d2c091336a42a90d009b
SHA17e371415ac29de6ad7995612eee711ccdc4e0a37
SHA2569b75df645f0dfbc366483ed6f865f627127fe98fe8441ac7dbd88cde7bb449d0
SHA512bfe7eb9cd240d42eb4d3524228a7df8327b41c480327e1f97fc72d88db242a9268a94cd5ac79adbbc58518caaeee24ca0ae9a1357b83abcb7dbd2cb26aecf0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55628a4f770b0616831fab2cbcca77127
SHA1ba7c3e142056b19f0cce8a748b3e5c04d075f2e4
SHA256ada9b33b5b40b21a650a4e1d3a0db07e437fc197ca6d1ffc90663ec27750db52
SHA5121659002faf4c830823dc80baf73491927e4d40c4402982f5b8bfa3e185f1b09241366e3c42813d071268835831696301b3605685221c5676354f83129d8c6f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9aa4d227ef259572f59edd302b0e5dd
SHA1733ec10a9b8316e221b524e7e19b9f3c18ff8464
SHA256b80c1e2d28d70f455e1561dc82af82178cf65b1684bcc9514dbcc6a7945513fa
SHA512efe72ef5960883ba53505b3d97cbed469b603c32ef708f8d39ab0a4cb98d11fb12b09206cc776e3f90d34b63b4bb0b1d3d8eb3955f63c1c35dbb42636a56460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7cfbd760115e84f4e0de78f743be6ad
SHA1831c9fd78e92934bf8c69626f3c192016b8edc59
SHA256578743839959553e9d691ea31e376c62de454e3bfa6e92caa861bfc519567950
SHA5128c727e5bae0865c099bafbb6110a3f21f57d5648abe2244ba8470f3bc2647c8eb59ec97014bcb3911a63b55296fd8eb4774c06d0cf3f6ca72c57120a49e54e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532293a20e6a2a3734ab2bd1912df5ef1
SHA1b8c91d944b48a0413c416084f7c82e9b0085cdbe
SHA25646d155ac829959f91b428b26df897127082eb79acdaad02822cb155d8170bed6
SHA512bca72d9b348baf8c460c046702cc8ead59cb6827588ab810da352fa8908ab29eabd4d818f62cc12b1d8bc399a69016623ea8371ea4fa9e9cf98790c670bb2f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f124e4be4f96a5440606624fafd36c05
SHA1bf88d594c27facf1c095f0e6bc8232617540bfd9
SHA2560b087f98c34016b53fcff9bb7c3910e23131af593c94bcd9a72b70109367983d
SHA512300bcabd43c159b32f4b0cbe1e92777c27e7013a5d0cf0ec6c6da8e0345101d5ce96ebfffade5bb51e01b380fa8cf261a367e69df68efed606a4b08a75ef4b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ebed1eed09dffce9b15fb8b886d7b17
SHA1c22e220ba30638c65dd41988a1d8e8b428d70b3d
SHA2561cd3da1a607a4ae0382ba7627c3778382871a0f60aef68b1333519ca5cc4ed39
SHA512ed89860f67460f90073f6d9765c25bf8278358017192edc8d0c23936c6c3b205d42557ba32c2bee9dbf2918c3e1cbdc04a5a8ac9c638935687e516e2fb215bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575cc87a1ec0479d9cdd802481e3f0fae
SHA175bc9afa2155560a1dcd960d173d2d3a70c25831
SHA256a7b03e1dfbb02aa9bc96d54215b58a789cd50fe07d46e6a5fe1d1cc48b3a0077
SHA5122e261573f250746586b6b693d52ee413db0334b590c8592039d4912e538c5b5a2bd6b030b6c8e403831b453be97e7da5c215060efac94741e31f2a106644006c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5145c8eca6f0a519014354194dc16fe6d
SHA17e0ebf4f7a8458e54f40dff1c917e1c118ac027b
SHA25614483e471c6318ede9a711d445747efe27bdfe68003656a2ecfc035cfb1b3251
SHA51280ae3f5840e7672ea03d2fbc8c1d5da1881b4c7226597d3276a8446ff077a0eea6c8f9bbf96376426a28dc58222209abcf210ea00ab6c0f0a76b597f90071408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5c85be06ae6827362ce727d924298e8
SHA112de5a499dd7fb4fecb14751f59e981fe6bc7c8b
SHA256c4bcba38cab4f2c515b0f1d95c456e079e8a62cadcb219aafd0d1fd8e50f7b23
SHA512c23045c649ea71d4fdfb8bfba55519530f424a47f7d66d9143b07b9ac8c9cdf355a4758b3e86bdd4fdbf34df13aff0fa0a514313a37443dcd48a94d3d23ee06b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7b935fa05669d5b5eeaa91d90d53def
SHA11b33bb09b3bf4770f938f787fcdeb8e91754e533
SHA2566962c959fd406a58d0c22cea4d2f8e0f99d52fe3ce6c9fd1bde46ab39c38b071
SHA51244eb0a602a809bd7d385b157852f2dec7eea4e6cbce42404168c7d4033d99439eb51f530b3288d04be85ac7b499e8b54ae6240caa3abac19e8f01ae188692e48
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a