Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
4671914ebb5e16c1745e3313015eee7a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4671914ebb5e16c1745e3313015eee7a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4671914ebb5e16c1745e3313015eee7a_JaffaCakes118.html
-
Size
18KB
-
MD5
4671914ebb5e16c1745e3313015eee7a
-
SHA1
6247a1dc6ef6fb4f29d8a91065a9d6ee3ef57945
-
SHA256
43e7de4689bae2ec92a9864448ab8ad207e7392cf00d73205a1accf0a9741530
-
SHA512
c7ba290b3637ed466ee596c237131bfedad4dcdb514f0c1c233b56c92bb32a461bd3add1bdc7bb343fc2f8d5929af5a5aadbdd92433d70b2eb62c1ea2cbda3cf
-
SSDEEP
384:IA8LL/PMvxzY6s+6O/xjny2OXVOZrMqCncB+TXpCCyDB/Z2RINCGhpfRWW694EFq:CPMEYKIZYyDBh2RIYAp6GeY
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007b3a7fb785bd22fc2370001a0ed3f5096d42e757f89a612d359f976294b5269f000000000e800000000200002000000054a937a0788d064790dc735e7c5aad29e8c1fa04869f55d908bb756d3e0d115390000000f9c1ab4e6836b4ed0275f764ec1c54cd339a3da28047bda6d4718c7fb7fede0707fc4fd713326ec4fc88be547554f217486f5f43c57def010207c580f4d60578c860e14b89289ae525cb0d9e22ab4649b0d8332e1116db16fc5d8eca82a54c73f25cb118e9e4e6bc0ad3779b175f659c7349a5ef2482de24b6ac152b510e159281100c0e81581c6c3cad86b528e5689940000000c579f459d756dde37502f97e34dd5d77524a563f7adcc497bd59a1054c78761a26f5c1fc5aadc7e027a04ce1b50392c5e1d6682ff924bc4be6ab4a8aa8dcee27 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421942337" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b722178e13d809d5acd756d95f6b5c017202971003a0067e4fccaa7ca214afb1000000000e8000000002000020000000e08988972ad5fbe1a33323b7ac305dbd11e6d74ee2fb4ad54b8b12431dea33132000000048966854e2fb13ea0d5de6740c341c79a1c5c9107ecd285b651cb23a71308be8400000007d17185bd3497a29d7194bd49d727bc8ea6a1c1fbd2ed3236b6dd58b6ce79ce48d3bf6bdeea32c3dea0baf49130de4d4b12636cafa756ebb71254788522e4056 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08972a3cda6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9FB5FD1-12C0-11EF-A649-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 1824 2424 iexplore.exe 28 PID 2424 wrote to memory of 1824 2424 iexplore.exe 28 PID 2424 wrote to memory of 1824 2424 iexplore.exe 28 PID 2424 wrote to memory of 1824 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4671914ebb5e16c1745e3313015eee7a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572cede1951aa200780b539e23f71ae3d
SHA18189bf06ccfdb933cce34a67135dbe7ca185d9a7
SHA2567a174ca7c30cf0667048db0bf70b117ae8e78dcdf5b03c9c9b632f26b836da58
SHA51256633cdb83e4ff369a81df4205f5effe67c628946155b1684a158dbb02956bd6064d42b121beed1a541a13a2f33fcb14322e720c42517afbf254449f6227fe97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52760c651373b6a958ab97405db923065
SHA1557024b071391d5b99346777de29926353dcdec0
SHA256eedff3fd5ddde5c45e477b0918575c159af2a3839469234b3c02cd80a34e0e7b
SHA512ccbf1de572bfb2c25abd18ad90d9b8df0dda4fd165c029a3404cc4ff23951c8078483b3c01dc3e45a4ac1e1c3b8b7157420d6159ec276312a0d8f9ba0ae1cb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5252c616566f4d55e91d7b73c57fabfe7
SHA19f0e7c7dd99739dff58ce18aa29d3989538b2987
SHA2564809b604dc029a2a1aa99dfa050af50a51c2197f904752158e0188db50692757
SHA512af74bbf5194b8b7b196cb080a0063f92634f90e327331f929ee2860210359b6918ab78b8bc642dfd15e69df04cc85c6c6cebf552f3e1363a83fb6c74c419c9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6cab1a8c6e3f9f169b2b2fe6d492338
SHA1df0c757b2ebe1a4914e375141022d682fcb75e7b
SHA25694a908de7d2cb9677e9581dff381516c1b39bece4d48c4d3c84384e7653149e0
SHA512df86c68f52adff1cdaa1f15e4b25c47d661f62d84de631230c4b2c57f36cc4c850ffa5c476d1bef4561d6a3c87b1a04130f8df2018221609895448d0cfb0bf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566afd13283d189fdcd85c703d6cd2cea
SHA16dec5c2c8acce6fe662b3146fda2f72611dd2a79
SHA25638fc0cef1fc30b0e444f5aa097d77ea371b98046043923616016c686bc26ab5b
SHA512c79505489eeb39e34ad6b8487deb77b99a9c886363fd3bbc8bf99f2aaf75a980ce5a55655ff902a16e93b92df52d3f8d16272726b8a0a5b6e66634975211777b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f77ab698072400de56b1594623fc2f4
SHA1d143b810723cc5976fb425cf6480629df9fd94db
SHA256bbe65482d3c9d9bed2412c4f8bb8a938eef72a0e0d242b74e1bd9efc7512b940
SHA512bd8d1696582a0cda3dac4a6b333f401ab339f73bd7d13263a80e24be0f670d5152b2e4465322f12e36e0cca2e92dafe1c79b4aba6164dad704f884915774f597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe5867204b3ad36682be316c1a4ffa73
SHA18883024fc6ca4434ee203c3fe163b30ebc42192c
SHA256731944242009dfebadcf6b6db9c70737bec2fe3e804c5bc39d71c49d15e3acd8
SHA512992c0b54bbabe242d1f4a8051d5e390b6a44382e3104df002f566ba2f1c301ad23b86dc0d60748a6ebb067018a81fafbeee6c1a0ea030fdd6c01794d95e5f150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dca7adbe4103389895eb14e8d1b8aca1
SHA1b7f6abc4c7dca9d0608ab10e3a613cbd42619f2c
SHA2566c3a608e4168a0b0f3648c55a6b0aab7a9d5d698b7fedf42bb1d7e84d0af275e
SHA512c8d05fd67c63023236171507fbbb8ac0c308daa4a0da4e59f548ef5f35f7aaf7ca85184bc48a02d56d535104eee80d30c4e02293b65973ee61496383ff8cbafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bd7388e29abcc0e41139bf18026cd7b
SHA14d35fa31169fcfa2f83a4b74dd9f93062bd310bd
SHA2566ad314856acd48b7a2e68da2400aa71f979aba745dece6e97494d51026f9e6fe
SHA5128f0e6c2693b1db9f761edea87fb8475fb462a7b83abacd2d568cc9e78dbe3fc0ea87a903c83d26ac14fb3ec29c956a21439d53fdc06dbb822f046059a341c2a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7a8fe48cd41a6d4b24907ff8a2916e7
SHA177f573dfd12f90170a00d8b26c067e7391cde9d1
SHA2563fb8333715c1d7ba82a684ce231a3df6f4ca0c0506d1db26d6fbc66c89579100
SHA512b4a24cb0a6d361389e2e56dc54ce7178d67eb384a392733f404d69548a82e903cdf8bdd5b33f080de72a228d8ad175df359d38f956c561f091d0bd5047b7f8bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc26496624275e54d74970d0c9bdb89f
SHA110f1e36c8fa37e0c23aa83a72229e55be78c59d4
SHA256e1e968797c1dbdb93f6267a7a211e53b36cfd1da1e5de6a39ae43816de0884d1
SHA512c98526ecd118539bf4b4cd557e7a248df226b4819dc617cac19f5f0ff6515758066cfdcdcb5ae27c2e88568b803099194a78868d38d4ba8f5bd3c639ea85d34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf51f3ad2cf94c0c5c8cee999dacf59
SHA1326d5d37acf9840b3de5f8834a030c1e0ac7bb6f
SHA2565bea7d18cd4e668408c4c2ab6775343632bef866e785973d8a6b0edcdd7eab7d
SHA51219748ff28be40aef4eaea92964d6249b5e0464b77a0b6189d2750c610c573a29e24627b4a0014bb080849c431464f7909dad2e006128957dd201f07b73594d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50752611d917196ab7d824ffa4e968f61
SHA1e0c918c681bb05fece8002f79abe796122be72d6
SHA256e872a3a308d6c67f736a0dccea4931cc174012d58a4ae9506ddbf01c092d3b26
SHA5127f6d6cfb70fb372d8be430b47642e78a3432b524527cf714993f4ae51fa49ace87b12615391ad4235299e0fdebaa3566139909eabbd253bfd5432634840ffb96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f765d2fe5fd0d394adcbecf3923ffa0
SHA162b4a2a7aee3cc56f02e3bca1791099ed9fb892f
SHA25605cdbc5b99243854b33adf2158e9b314bcba34590df97e259c7d6d1c9d358a6b
SHA512cf7d2a3d8d1069f889838f51b5e568c128bb9ed1cb6f4c184ea8c9549a6e2dc4c80720e7c52363de3b266a42307283a349697f71c12c99b4119039ed0e1fa93d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e04e877bf82bf3d483430fc09f25377a
SHA1462d257c8a8287e3903b3db63761bd05c9d901d3
SHA2563c6e45302c43225d9289e4f57cec8873cc1b741e15173902aa5f036666774fbf
SHA5123d36b17c46b72e3fea0d5b2060d4861a6aaa62dc4816e9f7044815e751604c7755591bfc202d8e7b8d937730d784919b65fd71247f5c6edd07d534a4caf94e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b85a769b878248a37d0e6fe32815a82c
SHA1b79e3812240f551a07014bda6f98f8b010362255
SHA256299ef348c21922c2f7549408bfa424584695d0e823b9e2e1c0d5f3984edac73d
SHA5124853fb7c30bc98ad01c37080ef771a136e557e732357afc0d9c0da47b1dba00427bbb0b9b4c9b2d62ce929aa70d5bf11b74cef328288aaafa16821d610314209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce1285f8a4dbd22a4bf6b2fecc75c126
SHA1ef796193c1cc2a780adf9818b67b20f01f4b1827
SHA256d75dd8934db35b465e8c8329d3dc5d2d3603c3e415e17c9483bcd8f176995855
SHA512c4085052abf6662685925b63f20e1e1b4830c7af40342abcd8a4b13ccda066587b1a3cf73a15d32b32248a79ab45b8906ead30e5b6f7aac33a157393fa92c455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e33195666a10ca57fd9d0e6048bba98
SHA1fa61d1c53839bed37b27bcd0d52b048413f4e097
SHA256702fa0408f76e421d299205aed4731b3251119a889ae3be46a1c49860f38ec44
SHA51257303d9034554331ba51978d62c02ecb723c04296cee033cf3ef172f9c8b665ebe689bb877203ccbfa45cfc0eede80fc521a0eef0b4449d192334926c5935795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56069a57dbf78e7e368668e5d53c493c3
SHA16a4684dac0a086cc1a3c26760c7ee8ffcf867e67
SHA256728abba4d01efe98ff22af1717b0886dba92878f4f3817d842e94e44a780e084
SHA512667b5ee4a0ad680af70efc62ea0e31b86684fb8feb65a328297af97eab52290aed761191fb5a5b947c40be2e23ad4412789ef43ad54286214b6bd639b960ec62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522210a631e60dec94e190642d1998f2f
SHA1b54fc4113d9eb9b52ace22e8ad2f411089a4cc8e
SHA25622404faee13fe054aa5744ce1945a2bfa63596dead5d49e6826d6c6e7e824397
SHA512f3395539b5e44ef9fecdf33fd5291d87e071c49ddcf691167cf62a32e8d8f7e8266232929b7935a2922d7ee20e396ac5d968cdbe28e3b7d20ac88e2eb12d9678
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a