Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
2d1b55b0ce5754fe6245165d5b4012b5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d1b55b0ce5754fe6245165d5b4012b5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d1b55b0ce5754fe6245165d5b4012b5_JaffaCakes118.html
-
Size
11KB
-
MD5
2d1b55b0ce5754fe6245165d5b4012b5
-
SHA1
622bb09fd19e14c1455b25e788f1f7c3b05cf3db
-
SHA256
157bd93c763e01705be2ace2c5f0a22d4f6c45da0d9cc244fda0bc465c337cd1
-
SHA512
ab0afc986ffede124a9ce036e1c2c4e68899b6635af8ea826c852458e07d0ec1d2587b9ba7978c5343c2dbd01b87c75765f7088dbc8df45b1b7998fb58c346ff
-
SSDEEP
192:SzDSgZ7AM2AMMEAMdAM5AMkdZFZp+jd3oEheIaiN//iAzcwwXZQD//8gcCKWLAgx:Siky1R1QRZQR3peIai9G5JAH8gcCKCdj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a35d830941c4f09583b353b940c2ede8350e89f7ff8275e663cae82adf4656da000000000e8000000002000020000000bd29346f18165b8d1e2ed6e086f7dffd323727fefeb97d1ee6d207bcda12d9c520000000b8be79f6cb20844b8f52fc5610f70d51671052b91c87f6e23856cfdf0f2239ab40000000ca5175da7e77bfe5ada615d2f6e09be89e6100761667e87c8a46ea76360a94f2d5fb1b0d2a0dc6c3bbb6c78c9196e3ef151dcef67e14b688fa9f36fc92e1a52d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000e568465f84ee9014ef159e1cc73724ca49d4afb483e6ea99fdbbee602d2e861d000000000e8000000002000020000000b9ecc230a70ec590a6a005453f93af57469773b2444b715fbfb97195f61f587f9000000074cbe2afeffbc5a940e66f2218e6130ae46e46b177e39c620fc4ae4c5452fe13c8bd3805d5e5667192bddbda17ee2fdc77c35cd23d00c18e3b03977b65b1bc4d026992620b1a254d85eb1add5b3ecf5b8f3547a252a48945d6f7f1520a3ba527ee3daa025b42888c345e27fcb9464b1589a33207a9bf8987720ea9f8d2a447d1383e0491d35142bc71ee1e3b074aab6c4000000003fe5a34ae37b1025a81f74f39a768c56b3377aaf768f1a83a7632b13f8fe18954c7d39b554d3b6dcfe2bb216a9529e5d14821b635e1147ba956af3800f1ef63 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{227BE321-0E7D-11EF-85B1-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f03f02f789a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421473476" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2044 iexplore.exe 2044 iexplore.exe 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE 2544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2544 2044 iexplore.exe 28 PID 2044 wrote to memory of 2544 2044 iexplore.exe 28 PID 2044 wrote to memory of 2544 2044 iexplore.exe 28 PID 2044 wrote to memory of 2544 2044 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d1b55b0ce5754fe6245165d5b4012b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5120eedd89a8f1987e0463694fd699583
SHA1bb7a577074b32f1736e3e7d21ba02bf62a99d93c
SHA256f1f350fb38dcc73db628c6e5979b8a8105b7aff39a592bde9bf271e84e32d31c
SHA5125e7b0f6b3856ae82fa6626f94d57764ce3638c07071757038a264edf259c246330940c37d8cda48a0ddca04d1b9eafbf764679c5b72872665b8b54470fda57b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc8fecf2452bb760fb634854902c7a62
SHA13b6d1515736cdbe5c5f26c146368f82a9c4766a0
SHA256cf33e9964b734eeba2e72bda9ea31845a577731c8b06f5cf8f1d18ceeffd3566
SHA5121a2468e5311d3f6ca991311a8660e3279deb264843675b4a94bd7d34c4ef3986ca5bc56737109163cad16c1871c238cdbac971a3338e04d0cf947b7642b1ccd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4c393698d7c272eeeaa583a4ace80d7
SHA114ff76d26ae288514620dce2f28810916879f80d
SHA2563f64a27c0ececee04f962505126250138f1dfd4d5b134dd60165290086dbebe8
SHA51203c4d88dfd611f92e38beec93f020d31965c6f011ccfc3563b5145960b6d0557f168c4266548a45745105c6758284d32434fa4c7434ad57e8c377085abd21ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583fbed48db57ae6b5a15da51b69f51d0
SHA1b61da529c99aa1e98a8990aacd72e4c9c1055d3f
SHA2563b8c969b89780b76f7c01a6a2d72b83989fc61d221c852e81f0c85487b935d30
SHA512184bc23ac32d5e8872919f62c8e3dc50ea644a054323f2c8aaa8d0f014d5f9cdbd49ccc11f36e3b1047c3d46ade1f4dd91ade9b4e5655166a407a33190c07731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524660c5810b6bcd6b8503c9690f68251
SHA1798319b3f96c479046e6d20d88d8b37d67c5f8e6
SHA2560d6513da92b8f55c49b9ffce29c658efcad84325e8d6385f06322e650e3b05e7
SHA51228d770f3e945be037fd0ad1403d92afe30c07148226ab8465e9d25bc639481aefc3f78592ceed2c9ca58236a9c540bcbdaa4affffe1846469887d82dcd7c39ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555c34118eb5b6d0930e4d49ed95e18b4
SHA1a249cdcd3cbd2d3dc152ea5047b600221387f1ec
SHA256ae21c1368e2606065a577db5422724b2f44fdcf4ba3c57f255f387375c2a3c03
SHA5129f681ef5dda96265307ad958cf1babdcdfa855ed0586c47794391335d75d00aa29feacab38ad2b0287d34b4ec040f3a758ed2eacf9a592493d645fc81caaf82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56818bca06d01a75955cfb5760a2a4eca
SHA14035f94815e9e98b194f5d3e7614c641c545e81b
SHA256fa30cb38cd6b611b99f245c46cceef2e7d7f4cb4346be0e9fc74ddc278fa10b7
SHA5129f2dad5129d7e53eb74c5f27a2e196918c3874ea95f517127a8627ff00ab990b01f077f49a13d66e241e1f12c7b1d685cab282ea8e1734c49afe0814af8910b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9bc0928391c1aaf3bd51ee71ddeb8c8
SHA1271db0268f22f7f8e7ad5f58e239a06281ef2bfa
SHA2566d54c10feb741ecf1160db30391875a50379e372dc00c28a0a76fef0ac7adec2
SHA5124962d51591816754114f145b23b58ea6147dd1b7ba784a16717c6f58753e4d8ce754de03b2c39f218245b3ea72c1a77df8adad4f0de008636a8f5b6263d52098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553522bee279ace5fa4a6923d9836afda
SHA148243b647e672b01bdd6888054aef768d0c61cea
SHA2566cf3c9bf1cae95918bdbf3c4041f913658c1ba13fd98f6448e19bd060f5d01a2
SHA5120997ef7706ffe480a4bf6cb2eeebac3978d89764c75935038226d96b8e3d7cd0c67ecacc2eae2a438e7904a18088be1c57e69a97085b76ea3a1d7b352a2ff24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3259ab46f2ddcdc722142dbf6d11cea
SHA1038798e9dd72facfb884271c98826f542431f229
SHA25605e5967a37773732579e4f10eff13923558c9a05c3562fa4e6e9dac68bc37507
SHA512fb7c6561c59053bce423572b3fd1e1b5448ce0fa69255dd98df40ded3d67e9d4618d4cfa9d143ac9fe2829fe5e52d4a33d890479504f5e5c9ea4cdc910ba703a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557caa61c2ccf456fadd08225e770c159
SHA108b8604afd2ad59aa8bfe1be8f7c1cb8c2e0e3e1
SHA25628a54fbaa206cc0046fc4e1fbec11a346cb6725c29d86a49cd95a8fffcc8d1cb
SHA512add57b916bc069e50d11d77154a72321f7e6210ea3d65c1f81442552addf97bbd4f58a6926130f39093dd3ee7d4e139b3061178af98305f49492e2af99a597bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51700e0c2b54277eda8623c3d4082a4b7
SHA165405304263870ea5c10fdd4eefeab287efe162a
SHA256e7d70c719b7d0c8249bae25f6477c8c311ef296d6ff062c840919818778b9bfa
SHA512d8fdc13cd356da982229a2f48b3d3da73e4e4631defbf6a7fb0f23f4f600d0b5500a81be8c9c6d5904d2d763b8787cebcf196d7d98e4d7228a759c88dac88eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5200954329e2f9744c3b0921626a9d5f9
SHA12bd81ccceb2f77d79df470705bba5604d7f390a4
SHA256f68d0796c44ff27e066b9c2dd652c01435fe43ae05941db597eb245d7b011c8a
SHA512664d30b3c551b978c9fbb4d3f6d3a4eb84e22f21553d23b4a16556a377a8df848f0f666a97c86bfae5f50a40a748e24aa9d68571851848536fc7592e26a7492c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55def6cc3448502066e2b9ed2299b91f9
SHA1ac85ee08737963609355c39296298c2234b92fd7
SHA2566bbe6a17ccc61c55e4b594f11abb873f78753db52267b0fc7fe5d47659789077
SHA512a1910a824ebfe4e5c77621124d1c9addd589c55cefd009d72f5a0aeeb6c861e143c03fca36ac8b9863098675e8f1934b1c39c08ffa9d09c383faee7f105543fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b80b69daa4ba931c99880232ced7ace2
SHA18c1aaae92a4b01d3569e361426f8b204ff7a85b9
SHA25669ba031c6399b266c4f9d191ed2c037924407a410e5306ceeaf17aa5274c72af
SHA5123fcc960514a80c220f2bf066c6048b2beb1153c2ff7e1c719eaea1ef124e139392e6b91ba99e3d3cb8d5d15d1ea7a8db3f16293c0b3bb61006e03c0160481786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab7f5cdcef1dc177cf931275a19fe367
SHA1d0e698e1d530cba8076559e9630eec989d46078c
SHA25698e245615379251b040279b26a738ea311c4db5272450a740789000fc2091d21
SHA51213aca6d83da8f7bd2191cf36fb15ff09f3f752626e8971f1198538462b12d4e67f4221683cfa51dc4dd27f67852e1bf118d77c6769f94c7b0cb084c4a8269674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d3a726c4cdfac797291dd4042724141
SHA19dd7505ba3793005393e3e58acc48bebc4114793
SHA2568854e97f2bb521d0d85fe64025df5a7004912fc9f7c5982eebf8665859e289ad
SHA5123d284bab95ef07d101172c0e603e93074f77660b44bd5c090a9f1376b298af0c3ce7fe85e7f7462113c6bfa4c94e253f1bcf7552ed6f8e3f6575ed3c02982ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2624b3d7c0bd0f47ba334ec47a120ab
SHA19e50c2197c60b3d1b007708d39dad6af7e0d4c17
SHA2561cb57767fb562afb1c9dfa4b57b9c8d26b91a0291cd19b49ddbe009d9cc9af6f
SHA51291951a0c077b98226682ed6eebe4e1818dbc8766a63863c03935f57f2241137c3613190143733e6b39959fe442cd0fc7e5eea399005b1be603e73fba4e70c2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c89ac9fb4fcdf6fcd5f8e8b2c347ab9a
SHA149d155956d483581dc6a5330a5ae89e016371112
SHA256ea18fdadaadab84f1c71b98d2c7d7994e1e7c7aae70b4450e29230c94887c381
SHA512acf8ee0ff362dee8ce22f4af0a290d8f48fca6ff1368a3de073fffd5157602542a62b5bd592a01b061a6fe9f8a8d9779f65a1fa3d94f57d41959668078ace025
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a